45
1 International Association of Penal Law / Association Internationale de Droit Pénal (AIDP) XIX International Congress of Penal Law: ”Information Society and Penal Law” (Rio de Janeiro, Brazil, September 2014) Preparatory Colloquium Section 4 (international criminal law) 912 June 2013 in Helsinki, Finland General Report International criminal law in the cyber world, how to apply the rule of law in an area of shared sovereignty General Rapporteur prof. André Klip, Maastricht University 1. International criminal law in the information society 1.1 Connecting the physical world with the virtual world The changes brought about by new computer and telecommunication technologies to our society are enormous and whilst ongoing, it is not exaggerating to state that they have dramatic consequences for various aspects of criminal law and criminal procedure. This justifies renewed attention to this issue within our association. It is not the first time that the AIDP looked into the topic of information law, albeit quite some years ago, and things have changed drastically. 1 The globalization of our society has the consequence that human behaviour may have its effect at many more locations than the place where the initiator of the conduct acted. Google earth, Street View, and Facebook and Hyves make clear to us that for many there is little that others may not be able to see. More and more people are online all the time with cell phones, Ipads or navigation systems. Big Brother is now finally watching us, we leave traces wherever we go. The world of crime follows (or some may even say is ahead of) the legal world. New technologies, such as telecommunication, computers and the world wide web may be both an useful tool as an interesting goal to commit an offence. Hackers may enter a network or an individual computer located in one state from a computer located at the other side of the world. Hate speech may be uttered through twitter, email messages or you tube tapes and have a global expansion. Cyber attacks may demolish or lame information networks, online banking systems and government servers. 2 With regard to the investigations into crimes committed in modern times, the information society raises new legal questions. The investigation into an international 1 See the General Report by Cole Durham, The Emerging Structures of Criminal Information Law: Tracing the Contours of a New Paradigm, 64 RIDP 1993, p. 79-117. 2 See various examples mentioned France 2.

International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

  • Upload
    lamanh

  • View
    236

  • Download
    0

Embed Size (px)

Citation preview

Page 1: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

1

International Association of Penal Law / Association Internationale de Droit

Pénal (AIDP)

XIX International Congress of Penal Law: ”Information Society and Penal Law”

(Rio de Janeiro, Brazil, September 2014)

Preparatory Colloquium Section 4 (international criminal law)

9–12 June 2013 in Helsinki, Finland

General Report

International criminal law in the cyber world, how to apply the rule of law in an

area of shared sovereignty

General Rapporteur prof. André Klip, Maastricht University

1. International criminal law in the information society

1.1 Connecting the physical world with the virtual world

The changes brought about by new computer and telecommunication technologies to

our society are enormous and whilst ongoing, it is not exaggerating to state that they

have dramatic consequences for various aspects of criminal law and criminal

procedure. This justifies renewed attention to this issue within our association. It is

not the first time that the AIDP looked into the topic of information law, albeit quite

some years ago, and things have changed drastically.1

The globalization of our society has the consequence that human behaviour may have

its effect at many more locations than the place where the initiator of the conduct

acted. Google earth, Street View, and Facebook and Hyves make clear to us that for

many there is little that others may not be able to see. More and more people are

online all the time with cell phones, Ipads or navigation systems. Big Brother is now

finally watching us, we leave traces wherever we go.

The world of crime follows (or some may even say is ahead of) the legal world. New

technologies, such as telecommunication, computers and the world wide web may be

both an useful tool as an interesting goal to commit an offence. Hackers may enter a

network or an individual computer located in one state from a computer located at the

other side of the world. Hate speech may be uttered through twitter, email messages

or you tube tapes and have a global expansion. Cyber attacks may demolish or lame

information networks, online banking systems and government servers.2

With regard to the investigations into crimes committed in modern times, the

information society raises new legal questions. The investigation into an international

1 See the General Report by Cole Durham, The Emerging Structures of Criminal Information Law:

Tracing the Contours of a New Paradigm, 64 RIDP 1993, p. 79-117. 2 See various examples mentioned France 2.

Page 2: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

2

network for the production of child pornography and the dissemination of its products

may require to visit websites, to enter their protected areas, to look into mail boxes, to

analyze discussion and news groups and to identify the individual IP-addresses of

computers. Cloud computing3 raises the question of where data are stored and which

legislation applies to it.4 Also wireless communication poses new problems to law

enforcement agencies, because the transmission of data may involve various states or

international organizations. The person using a cell phone in one state may converse

with a person in another state. However, the satellite(s) transmitting the conversation

may be owned by other states or private parties and located in space. What does this

mean for the possibilities of intercepting the conversation?

In times in which there are various situations in which it is important to have a certain

position of information that will enable the state to prevent or respond to terrorist

attacks, states have concluded so called Passenger Name Record agreements. In

addition, states have developed (common) databases that may be consulted directly

without intervention of the state that supplied the information. For instance, among

Member States of the European Union, DNA-databases allow direct consultation to

check whether a new sample matches DNA-profiles already present in the national

databases of other states.

Thus far, despite its presence for quite some decades already, the emergence of cyber

crime did not lead to much legislative activity on the international level. The main

documents are the Convention on Cybercrime,5 and its Additional Protocol to the

Convention on cybercrime, concerning the criminalization of acts of a racist and

xenophobic nature committed through computer systems. The drafters of the

Convention on Cybercrime did relate the necessity of the convention to developments

in the society as a whole.6 Cyber crime is regarded as a common problem. In our

times there will not be many subjects that are so inherently linked with an

3 Cloud computing is defined as “a model for enabling ubiquitous, convenient, on-demand network

access to a shared pool of configurable resources (e.g., networks, servers, storage, applications, and

services) that can be rapidly provisioned and released with minimal management effort or service

provider interaction.” Peter Mell and Timothy Grance, The NIST definition of Cloud Computing 2011,

Special Publication 800-145, National Institute of Standards and Technology. 4 See Laviero Buono, the Global Challenge of Cloud Computing and EU Law, Eucrim 2010, p. 117-

124. 5 Budapest, 23 November 2001, ETS 185, 39 ratifications as of 26 May 2013. Most states that

submitted a National Report are a party. It was ratified by Belgium, Denmark, Finland, France,

Germany, Italy, Japan, Netherlands, Spain, Switzerland and the United States. It was only signed by

Poland, Sweden and Turkey. The Additional Protocol received 20 ratifications as of 26 May 2013. Of

the reporting states it was ratified by Denmark, Finland, France, Germany and the Netherlands. The

additional Protocol has been only signed by Belgium, Italy, Poland, Sweden and Switzerland. 6 In the preamble to the Convention on Cybercrime the necessity of international legislation in a global

information society has been described with the following arguments: “Convinced of the need to

pursue, as a matter of priority, a common criminal policy aimed at the protection of society against

cybercrime, inter alia, by adopting appropriate legislation and fostering international co-operation;

Conscious of the profound changes brought about by the digitalisation, convergence and continuing

globalisation of computer networks; Concerned by the risk that computer networks and electronic

information may also be used for committing criminal offences and that evidence relating to such

offences may be stored and transferred by these networks; Recognising the need for co-operation

between States and private industry in combating cybercrime and the need to protect legitimate

interests in the use and development of information technologies; Believing that an effective fight

against cybercrime requires increased, rapid and well-functioning international co-operation in criminal

matters.”

Page 3: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

3

international dimension and therefore make it difficult for states to act and legislate

individually.

The definitions used in Article 1 of the Convention on Cybercrime are used in this

report. In addition, cyber crime is understood to cover criminal conduct that affects

interests associated with the use of information and communication technology (ICT),

such as the proper functioning of computer systems and the internet, the privacy and

integrity of data stored or transferred in or through ICT, or the virtual identity of

internet users. The common denominator and characteristic feature of all cyber crime

offences and cyber crime investigation can be found in their relation to computer

systems, computer networks and computer data on the one hand and to cyber systems,

cyber networks and cyber data on the other hand. Cyber crime covers offenses

concerning traditional computers as well as cloud cyber space and cyber databases.

Without lifting the veil too early in this report it must already be mentioned that there

is a general concern amongst National Rapporteurs to consider their national

legislation to be insufficient vis-à-vis the problems that cybercrime pose.7 The

Brazilian report phrases this in its opening statement as follows: “A pesar de que la

importancia de Brasil en el mundo es cada vez mayor y que el país está cada vez está

más integrado en las relaciones internacionales y las actividades económicas globales,

la legislación penal brasileña en materia de crímenes informáticos es reciente y aún

incipiente.”8 In the French Report it is called for a more modern legislation adjusted to

the needs of our times: “Face à la mondialisation des risques, il n'est certes pas

inconcevable d'imaginer une mondialisation de la réponse et d'instaurer une sorte de

lex paenalia electronica. Mais on en est loin ! Quoi qu'il en soit, les normes destinées

à encadrer les activités se déroulant dans le cyberespace sont perfectibles. Elles ne

sont d'ailleurs pas seulement « territorialisées ». Elles sont aussi, de plus en plus, «

internationalisées».”9

Developments in the legal world have always had parallel consequences in the world

of crime and the ways to combat crime. In essence, the main question for this General

Report is: what are the implications of the global society becoming an information

society for international criminal law? This will be done with regard to the various

relevant aspects and in the following structure. First jurisdiction and locus delicti

issues will be dealt with, as these determine whether the substantive criminal law of a

state is applicable to the conduct (par. 2). Subsequently, the possibilities for

investigating in the world of cyberspace will be looked at, especially in view of

determining whether these are measures of a purely national character or with an

transnational dimension (par. 3). Paragraph 4 focuses on mutual assistance in criminal

matters. To what extent can the assistance between states cope with or make use of

new developments? The difficulties of criminal law enforcement in the clouds are the

topic of paragraph 5. Modern technology may also have consequences for the way the

criminal proceedings are conducted in court. Paragraph 6 explores the current

practices and the possibilities for the future. Paragraph 7 identifies the problems that

7 Draft Resolution 1 relates to this problem: “States should develop a coherent response to the

challenge of cybercrime, in particular by keeping their legislation and practice under review in order to

ensure that their criminal law, criminal procedure and mutual legal assistance regimes meet the needs

of today’s interconnected globalised world.” 8 Brazil 1.

9 France 13.

Page 4: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

4

come up in ensuring human rights in cyberspace. Concluding observations are made

in paragraph 8.

Attached to the General Report are draft Resolutions which were adopted by the

participants to the preparatory colloquium held in Helsinki on 9-12 June 2013. It is

referred to each an individual resolution in the text of this General Report for the

purposes of better understanding. The Resolutions should be interpreted in the context

of this General Report.

1.2 Purpose of the General Report

It is the task of the General Report to identify the issues that are at stake. Which issues

related to the information society in criminal law appear on the horizon? This picture

will contribute to making an analysis of the various aspects of information society and

international criminal law, to raise further questions to stimulate the debate and to

suggest solutions. Section IV of the AIDP is traditionally the section in which the

various elements of the other three sections come together. The General Rapporteur is

aware of the potential overlap with issues dealt with in each of the other three

sections. However, this is an inherent aspect to this topic.

Following the well-proven methodology within the AIDP, the General Reporteur

obtains his information from the national reports submitted by the National Groups

that have nominated their National Rapporteurs. The National reports were framed

according to the Questionnaire drafted by the General Reporteur in consultation with

the Scientific Committee of the AIDP. In several meetings all four general

Rapporteurs, Emilio Viano, Thomas Weigend, Johannes Nijboer10

and André Klip

discussed the draft questionnaires intensively. I enjoyed the high level of the debate

and the inspiring atmosphere very much. The General Rapporteur expresses his

gratitude to all National Rapporteurs for the time and effort they have put in

delivering such a high quality of reports, offering a wide variety of approaches and

giving much food for thought. The collection of National Reports is a source of

inspiration to explore. It is offers an enriching comparative perspective on various

legal systems across the world.

Writing this report was a challenging, but also pleasant task, as the national reports

offer a lot to learn. In this context I refer to the French Report that distinguishes three

approaches to cybercrime: a semantic approach, a criminological approach and a legal

approach. In essence it focuses on the question that is central to this report as well:

“l'un des aspects qui est au cœur de la problématique du droit pénal de l'internet : dans

quelle mesure ce droit prend-il en compte à la fois l'ubiquité et l'immédiateté qui

caractérisent les flux d'information sur le Web ?”11

This General Report profited from the input of seventeen National Reports of the

following national groups: Argentina,12

Belgium,13

Brazil,14

China,15

Denmark,16

10

In April we received the sad news that Hans Nijboer passed away on 13 April 2013. He was a

charming and inspiring colleague, who is missed by many. 11

France 1. 12

Javier Augusto De Luca, Marcelo Riquert, Christián C. Sueiro, María Ángeles Ramos and Francisco

Figueroa.

Page 5: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

5

Finland,17

France,18

Germany,19

Italy,20

Japan,21

the Netherlands,22

Poland,23

Spain,24

Sweden,25

Switzerland,26

Turkey,27

and the United States.28

When referring to the

national reports, the country will be mentioned, as well as the page of the original

format submitted to the General Rapporteur.

2. Jurisdiction and Locus Delicti

Jurisdictional principles

In their answers to the questionnaire, the national reports by and large state that their

states apply the regular principles of jurisdiction. States apply classical principles of

jurisdiction, such as the principles of territoriality, active and passive nationality/

personality, domicile and universality. States did not develop new jurisdictional

principles in relation to cyber crime and apply the already existing principles.29

It

seems that the only country that has amended its jurisdictional principles in relation to

cybercrime is Denmark. Article 9a of the Penal Code creates jurisdiction over an

online criminal act that has a relation to Denmark.30

Whilst the United States in

principle does not apply its laws outside its territory, it does provide explicitly for

extraterritorial jurisdiction in certain cases, including cybercrime.31

In the US report it

is referred to the USA Patriot Act that gives jurisdiction if the offence involves an

access device relevant for entities in the United States. For the rest, it appears that the

existing jurisdictional principles of states are applied. Most reporters report that, given

the extensive existing jurisdiction, their state does not face severe difficulties to claim

jurisdiction.32

This is an interesting observation as the jurisdictional principles were

developed to apply to physical conduct that causes effects nearby. Apparently, they

can easily be used for digital contacts over a long distance.

Only very few states apply universal jurisdiction and if, only to some cyber crimes. It

is reported that the list of crimes for which universal jurisdiction is applied is very

13

Gert Vermeulen and Lynn Verrydt. 14

Carlos Eduardo Adriano Japiassú and Rodrigo de Souza Costa. 15

Guo Jing. 16

Jørn Vestergaard. 17

Karri Toltilla. 18

Jacques Francillon. 19

Florian Jeßberger. 20

Mariavaleria Del Tufo and Tommaso Rafaraci. 21

Takeshi Matsuda, Tadashi Iwasaki and Megumi Ochi. 22

Anne-Marie Smit. 23

Arkadiusz Lach. 24

Patricia Faraldo Cadana and María de los Ángeles Catalina Benavente. 25

Nils Rekke and Anna Graninger. 26

Sabine Gless, Anna Petrig, Dario Stagno and Jeannine Martin. 27

Murat Önok, Baris Erman and Güçlü Akyürek. 28

Bruce Zagaris. 29

Argentina 3, Sweden 1, Turkey 1, Finland 3, Poland 3, Netherlands 7 and 12, Italy 1, Brazil 2,

Denmark 1, Belgium 1, Spain 1, Germany 2, France 5, Switzerland 8, Japan 1, China 2. 30

Denmark 2. 31

United States 2 and 3. 32

Sweden 1.

Page 6: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

6

extensive in Turkey.33

The Netherlands have universal jurisdiction over hacking as a

terrorist offence. In addition, concerning a few other offences specific jurisdiction has

been vested.34

Italy reports that once a treaty obliges the state to apply the principle of

universality, it has immediate effect in Italy.35

Locus delicti

With the growing importance of the technical developments old legal concepts may

have difficulties to keep pace. Whereas in the past it was relatively easy to locate

conduct to a specific place of commission (locus delicti), it increasingly becomes

difficult to locate conduct in cyberspace. Some authors refer to this phenomenon as

the “loss of location”.36

In the Italian National Report the term “a-territoriality”

appears.37

Similar terms can be found in the French Report: “Il s'agit en effet de

concilier le caractère spatio-temporel – délimité et stable – de la norme de droit pénal

avec le caractère global de l'espace virtuel.”38

Many differences can be found in the manner of how states determine the locus of an

offence. States may consider that an offence has been committed on its territory, if it

produces effects there. 39

The IP address of a computer points at a physical address.40

Sweden reports that if one cannot determine the locus delicti for certain, but there are

grounds to believe that the crime was committed in Sweden, it has jurisdiction.41

Danish jurisdictional law applies a wide understanding of the link with Denmark: “A

cybercrime related to pictures, sound or text disseminated from another country but

made commonly accessible for an indeterminate group of users by the internet, is

regarded as also conducted in Denmark if the material has some kind of specific

relation to Denmark, e.g. by being phrased in Danish or concerned with matters

related to a specific group of individuals living in Denmark.”42

The National report

for Belgium states that there is no specific theory for determining the locus delicti of

offences in cyberspace. What is necessary is that it must be established whether there

is a constitutive element of the offence that took place in Belgium.43

Turkey reports that any content that can be accessed from any person in Turkey can

possibly be described as a crime committed in Turkey.44

This seems to create a rather

broad jurisdiction as it also relates to content uploaded in the country and stored in

servers in Turkey. It is interesting to see that concerning the criterion that content can

33

Turkey 5. 34

Netherlands 14 and 15. 35

Italy 5. 36

Bert-Jaap Koops, Ronald Leenes, Paul De Hert and Sandra Olislaegers, Misdaad en opsporing in de

wolken, Knelpunten en kansen van cloud computing voor de Nederlandse opsporing, Tilburg Institute

for Law, Technology and Society 2012, p. 7. 37

Italy 6. 38

France 4. 39

Argentina 1, Sweden 1, United States 3, Italy 3, Brazil 2 and 3, Denmark 1, Germany 2, France 9.

See also Draft Resolution 6: “Offences may have more than one locus. States may establish a locus

delicti within their borders if conduct takes place there or causes effects there.” 40

Argentina 1, Sweden 1. 41

Sweden 1. 42

Denmark 1. 43

Belgium 2. Similarly Spain 1. 44

Turkey 1.

Page 7: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

7

be accessed from Turkey the distinction made between “pull-technology” (described

as any method of access depending on the will of the user) and “push-technology”

(described as any method of access depending on the will of the provider or host) is

deemed to be irrelevant.45

In essence the location of the information is not relevant for

the determination of Turkish jurisdiction. It is important to note that, if the locus can

be determined in Turkey, it has the effect that neither double criminality is required

nor a transnational ne bis in idem rule applies. One of the problems with the

application of a territoriality principle based on access at the territory of the state

could be that the perpetrator may not know all the particularities of specific national

legislation.46

This is certainly true, however, one could rebut this with the argument

that perpetrators who use the internet for their activities create the risk that their

conduct might fall within the boundaries of a criminal law provision. Those who skate

on skin ice, should not be surprised to fall in the water. In this sense the suggestion in

the Turkish report, that the nexus with the territory should also depend on the will of

the perpetrator is valuable.47

We will return to this at the end of this paragraph. A

similar observation is made in the Finnish report. If the discriminating statement is

made in Finnish, it can easily be assumed that it is directed towards the Finnish

audience.48

The French use a different term, which apparently has a similar meaning

“l'enracinement social du délit.”49

It is a concept developed on the basis of case law

concerning copy rights in which the crime is either located at the place where the

owner of the copy rights has domicile or in France when the offence focuses at an

impact on the French public order.50

On the basis of Article 8 of its Penal Code, Switzerland applies the theory of the result

to determine the location.51

However, the National Report also criticizes the concept

for a lack of clarity: “to construe a place of commission in Switzerland based on the

theory of result is only possible for result offences - but not for conduct offences,

which do not feature a result as previously defined and for which, as a consequence, a

place of commission can only be located in Switzerland based on the theory of

acting.” Under Swiss law it is relevant to identify the nature of an offence as a result

or conduct offence. This means that for conduct offences, Switzerland only has

jurisdiction if the conduct can be located in Switzerland. For result offences, things

are different and there is jurisdiction if the result is felt in Switzerland.52

Because of

the distinction made between result and conduct offences under Swiss law, it is

absolutely necessary that the place of commission is identified. Also under Japanese

law, a distinction between conduct and effect is made. The National Report states:

“The dominant doctrine claims that the Japanese Penal Code can be applied in

45

Turkey 2. 46

Draft Resolution 7 is the gist of this thought: “States should exercise restraint in applying the effect

theory in situations in which the effect is not “pushed” by a perpetrator into the state, but “pulled” into

it by an individual in that state.” 47

Turkey 7. 48

Finland 5, Denmark 1 and 2. 49

France 9. See further: “Selon cette thèse, la compétence judiciaire serait déterminée par le lieu du fait

générateur (l'émission du message en l'occurrence), la compétence législative par le lieu de la

survenance du résultat (la réception du message), lorsque du moins certaines conditions se trouvent

réunies.” France 12. 50

France 10. The National Rapporteur points at the danger that the legality principle may be violated.

How should the perpetrator know whether there are sufficient indications that conduct addresses the

French society. 51

Switzerland 11. 52

Switzerland 12 and 13.

Page 8: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

8

accordance with the principle of territorial jurisdiction (art.1) when one of the

elements of the crime, in particular, the “conduct” or the “effect” of the crime, takes

place within the territory. But some authors claim that the place of commission should

not be specified only by the “conduct” of the crime and require the “effect” to take

place in the territory in order to apply art.1 of the code.”53

For the United States the location of the place of the commission is not essential.54

Several statutes of this country can do without the determination of the locus delicti,

whereas other require showing that the computers involved must have been used in or

affect interstate or foreign commerce and computers used by the federal government

and financial institutions.55

This is especially relevant with regard to a “protected

computer”, a statutory term of the Computer Fraud and Abuse Act. With regard to

“protected computers” it is irrelevant from where the perpetrator accessed the

computer.

The law of the Netherlands poses the specific requirement that the locus of the crime

must be mentioned in the indictment. However, on the other hand, it does not need to

be described very precisely.56

The Dutch National Rapporteur raises the question

whether in the future the determination of the locus delicti in cybercrime cases may be

omitted as it does not have any added value.57

This seems to be a delicate point.

Whilst most systems maintain that determining the locus is important, they have also

found creative ways to identify a locus within their borders. The way states have done

that makes the question whether determining the location is still relevant more

pertinent. The creativity that states demonstrate in their practice of localizing an

offence within their borders has had predominantly two consequences. The first being

that criminal conduct may have more than one locus delicti. The second being that

there are numerous conflicts of jurisdiction.

Some offences are more vulnerable in this respect than other. Multiple loci delicti are

likely to appear with a crime such as public incitement to an offence: where the

message has been written, where the message was made public and where the danger

of the crime has been caused.58

Or put in a different way: “a crime is committed in a

place where the perpetrator acted or failed to act he was obliged to, or where the effect

of the crime described in the definition of the crime took place or was intended to take

place”.59

The law of the Netherlands requires a connecting link, but is rather lenient as

to what qualifies as such.60

The theory of ubiquity is applied in many states, requiring

a relevant link.61

Applied on top of broad offence definitions or collectivities of

perpetrators (organized crime, money laundering, terrorism), it results in a very broad

jurisdiction.

53

Japan 1. 54

United States 2, Poland 2. Similarly in Finland. The National Rapporteur states that there is no clear

view on the question where a cybercrime is committed (Finland 2). 55

United States 3. 56

Netherlands 10. Similarly Italy 4, Brazil 2 and 3 and Spain 1. 57

Netherlands 10. 58

Finland 5, Switzerland 10, referring also to a decision of the Supreme Court that left open whether

the place where the server is located could be the locus of the crime. 59

Poland 1, Netherlands 7, China 1 and 2. Germany 3 refers to an explicit provision of Article 9 of the

German Penal Code. 60

Netherlands 8. 61

France 5 and 6, Switzerland 9.

Page 9: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

9

There is also broad jurisdiction in Germany, where the offender acts at any place

where he performs an activity with a view to the materialization of the elements of the

offence.62

This may have quite an impact. The National Report for Germany refers to

the “landmark decision of 12 December 2000 (“Toeben”) the Federal Supreme Court

(Bundesgerichtshof, BGHSt 46, 212) found that the crime of “incitement to hatred”

(Volksverhetzung, Section 130), as a crime of “abstract-concrete endangerment”

(abstrakt-konkretes oder potenzielles Gefährdungsdelikt), may be qualified as a

territorial offense (“Inlandstat”) even if the offender physically acted in Australia

only.”63

However, on the other hand it is suggested that given the universal reach of

cyberspace a restrictive approach should be taken with regard to abstract

endangerment offences. The mere fact that data are uploaded in the internet does not

create a territorial link with Germany. It is reported that case law does not as yet give

an explicit answer as to when Germany may be seen as the place where the offence

took its effect.64

With regard to the question whether the national criminal justice system could do

without a determination of the locus, most reporters denied that this could be so,

unless the offence would be one subject to universal jurisdiction.65

The Belgian

Rapporteurs oppose universal jurisdiction as it would increase the likelihood of

conflicts of jurisdiction.66

Whereas in Germany the exact determination of the locus

may not be important in cases of universal jurisdiction, the fact that the locus is

outside Germany does have specific procedural consequences. On the basis of Article

153c Code of Criminal Procedure Germany applies the opportunity principle with

regard to prosecution instead of the principle of legality, that obliges the prosecution

to prosecute all crimes committed in Germany.67

The German report opposes a

location free application of jurisdiction both on theoretical as practical grounds. The

theoretical grounds relate to sovereignty and circumvention of mutual assistance

treaties. The practical reasons to selective choices in enforcement, overburdening of

German authorities and conflicting competences of states.68

The German report states

that the fact that the location of cybercrime may be difficult to determine is not as

such a reason to apply the principle of universality.

In Switzerland, the question of whether universal jurisdiction ought to apply to

cybercrime offences has been debated. The National Report puts it this way: “it has

been argued that the Swiss judge should be elevated to a position of a “judge of

cyberspace” - a space to which the concept of (national) borders is foreign - with

universal competence to try cybercrimes.”69

However, there are currently no

proposals and it is expected that the Swiss case law will rather broaden the existing

jurisdictional principles, as well as the notion of result.70

62

Germany 3. 63

Germany 3. 64

Under German law, for the determination of the jurisdiction it is not relevant where the incriminating

data may be located, what is relevant is where the effects of this data took place. See Germany 4. 65

E.g. Argentina 2. 66

Belgium 3. 67

Germany 5. 68

Germany 5 and 6. 69

Switzerland 21 and 22. 70

Switzerland 22.

Page 10: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

10

It is fair to conclude that the most important principle of jurisdiction with regard to

cybercrime is the principle of territoriality. As states interpret territoriality very

broadly and apply it to mean that a crime is committed where its effects are felt, most

offences do not pose any jurisdictional problem.71

There is neither evidence that any

of the other principles play a significant role in practice, nor that it is necessary to

change or enlarge principles of jurisdiction. The fact that in many cases the

territoriality principle is applied, is also relevant for other reasons. As this is the

strongest principle of jurisdiction and its application is undisputed under international

law. However, as I interpret it from the French report, it is a position chosen by lack

of alternative. States are forced to declare themselves competent in a manner that

amounts to universal competence, without saying so.72

On the other hand, by

extending their notions of territoriality and locus delicti on first sight, they evade

potential disputes and quarrels over sovereignty.

Conflicting jurisdiction

States generally have a tendency to prevent that conduct may not fall under the

jurisdiction of any state and have thus increasingly extended the scope of application

of their criminal law.73

Whilst there is little evidence of cases in which states wanted

to claim jurisdiction in practice, but were unable as a result of lacking jurisdiction,

most states have widened their jurisdiction over the years. They intended to solve the

potential problem that there is not a single state able to apply its criminal law to

certain conduct and produced as a side-effect. Additionally, the cross-border nature of

the offence as such has increased multiple jurisdiction. As a consequence of the

practice of widening the extraterritorial application of criminal law, in theory

numerous positive conflicts exist by definition.74

Various questions can be raised as a

result of it. Should this be prevented? Is this problematic? Does this lead to real

problems in practice, or is it in essence an academic problem?75

My conclusion from

the National Reports is that overlapping jurisdiction is currently a huge problem in

theory, but not a real problem in practice among states. It is striking that with the

exception of France very few national Reports mention case law on cyber crime at all,

left alone on jurisdictional disputes. The French Rapporteur draws the attention to a

different aspect of this and refers to the problems that result from the application of

diverging legislation for the citizen, for whom it is impossible to know which norm is

applicable to his conduct: “que tous les droits pénaux du monde sont applicables au

contenu de la communication – quand bien même ils se contrediraient entre eux – et si

71

As the German Rapporteur states, it does de facto lead to universal application of national law, see

Germany 4. 72

France 7, see also Switzerland 22 and 23. 73

I will not use the commonly used term ‘negative conflict of jurisdiction’, which I consider to be a

wrong name tag to the situation. There is no conflict at all when there is no state that has jurisdiction

over certain conduct. In the absence of applicable penal law there is not even a criminal offence. 74

The existence of numerous conflicts of jurisdiction is recognised in all national reports. See for

instance Belgium 2. 75

In a comparative study commissioned by the Netherlands’ Ministry of Justice, Klip and Massa

conclude that there are hardly any prosecutions for crimes with a locus delicti outside a state’s territory.

See André Klip and Anne-Sophie Massa, Communicerende grondslagen voor extraterritoriale

rechtsmacht, Maastricht University 2010 http://www.wodc.nl/onderzoeksdatabase/vestiging-

rechtsmacht.aspx?cp=44&cs=6802

Page 11: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

11

l'on présume que tous les acteurs de celle-ci ont connaissance de toutes leurs

prescriptions et sont par suite tenus de les respecter!”76

The Turkish Report states that the jurisdictional principle of complementarity was

implemented to avoid negative conflicts of jurisdiction following the European

Convention on the International Validity of Criminal Judgments.77

According to the

Turkish National Rapporteurs, in the area of cybercrime, positive conflicts pose more

problems than negative conflicts. The Netherlands provide over specific regulations to

deal with solving conflicts of jurisdiction, legislation has been adopted both at an EU

level as at the national level.78

National Reports from EU states refer to Eurojust,79

Framework Decision 2009/948 and occasionally to the 1972 Transfer of Criminal

Proceedings Convention as a mechanism to solve jurisdictional conflicts. In addition,

ne bis in idem provisions are mentioned.80

Italy also refers to Article 22, paragraph 5

of the Cyber Crime Convention that provides for a consultation tool.81

Brazilian law provides for a regulation concerning a positive conflict of jurisdiction in

case of jurisdiction over crimes committed outside Brazil due to obligations from a

convention, as well as jurisdiction over a foreigner who committed a crime against a

Brazilian national outside Brazil.82

In the United States case law has developed rules

on the prevention or settlement of conflicts of jurisdiction.83

In essence, it gives

preference to the state with the strongest link, except contra-indications that would

make it unreasonable.

The absence of any rules relating to solving positive conflicts of jurisdiction should be

regarded as an indication that in practice relatively very few offences are prosecuted

and that, if this happens, it did not attract the attention of another state. There are no

cases reported in which positive conflicts of jurisdiction have led to problems. The

regional systems set up in the EU and the Council of Europe are general for all

offences and do not give specific rules for cyber crime. Cyber crime belongs to the

offences for which overlapping jurisdiction is a specific characteristic.84

Supranational adjudication and sovereignty aspects

Another way to approach things could be that for certain crimes, for which the locus

delicti is difficult to find or crimes that imply concurrent jurisdiction, supranational

adjudication should be provided. The advantage could be that a supranational tribunal

would have the power to solve the jurisdictional conflict in a manner binding to the

states involved. Additionally, a more specialized tribunal and prosecution could deal

76

France 8. 77

Turkey 6. 78

Netherlands 15. 79

Spain 2, Germany 6. 80

Italy 5, Switzerland 20. 81

Italy 5. 82

Brazil 4. 83

United States 4. 84

See Draft Resolution 4: “States should exercise restraint in the establishment of extraterritorial

jurisdiction, with a view to preventing conflicts of jurisdiction rather than relying primarily on their

resolution once they occur.”

Page 12: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

12

with specific forms of transnational crime, which go far beyond the possibilities of

national law enforcement authorities.

Except for Turkey, none of the National Reports addressed the issue.85

This is

understandable in light of what was identified above, the absence of an understanding

that overlapping jurisdiction is problematic. It also indicates that it does not appeal to

something that states could not manage themselves. However, the question must be

raised to what extent states may enlarge their jurisdiction without touching upon the

sovereignty of other states. A number of reports refer to the 1927 Locus judgement of

the Permanent Court of International Justice, which is understood to make a

distinction between substantive criminal law jurisdiction and the jurisdiction to

enforce and investigate. Whereas extraterritorial jurisdiction can easily be established,

this is different for procedural elements. In the context of applying their national

criminal law over offences sovereignty is not mentioned frequently in the national

reports. This may relate to two factors: the fact that most states locate cyber crime on

their own territory and the fact that states have the tendency to be less sensitive to an

infringement of sovereignty of others than to their own sovereignty.

Crimes with a transnational dimension

The French report distinguishes between offences that aim to damage the various

cyber systems and the other for which cyber technology is a means to commit a crime

that in theory could also be committed by physical means. This ambiguity explains

the fact that some reporters mention many offences,86

whereas others report that the

definition of offences do not have jurisdictional elements.87

Some state that it is

impossible to list all cybercrimes with an international dimension.88

The Japanese

Rapporteurs observe: “All the cybercrime offences can have a transnational

dimension because the cyberspace does not have a border. However, it does not

necessarily mean that all the cyber crime offences actually have a transnational

dimension: Cyber crime offences can take place also in national dimension.”89

A

similar expression of the multifaceted aspects of cybercrime can be found in the

Chinese report: “It is controversial to say which cyber crime is transnational. Some

believe all cyber crimes are transnational in nature. Some believes the crimes against

the internet information are transnational due to the non-boundary fact of internet;

while traditional crimes with cyber as a tool are not transnational in nature.”90

There is a wide variety of crimes that are reported to have a transnational dimension:91

Child pornography,92

interference with electronic mail,93

illegal access to a

information system,94

unauthorized publication of correspondence,95

disclosure of 85

It should not lead to the creation of a supranational body, Turkey 10. 86

Sweden 2, United States 3 and 6, Germany 7. 87

Argentina 3, Belgium 3, Switzerland 8, Spain 3, with the exception of „child pornography

trafficking”. Japan mentions the exception of Art. 21 (4) of the Unfair Competition Prevention Act that

contains jurisdictional elements. 88

Sweden 2. 89

Japan 3. 90

China 4. 91

Numerous offences are reported from the Netherlands, see Netherlands 10-12, on citation Evert

Stamhuis, National Rapporteur for the Netherlands for Section 1. It is noted that in many cases the

transnational dimension of cybercrimes does not result from the nature of the offences, but rather from

the typical methods of their perpetration (Turkey 8, Netherlands 17). 92

Argentina 3, Turkey 8, Brazil 5. 93

Argentina 3, Turkey 8, Italy 4.

Page 13: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

13

secrets,96

offences in relation of data protection,97

electronic forgery,98

demolition,99

interrupting and impeding communications,100

interference with evidence,101

public

defamation of persons/ hate speech,102

denigration of the Turkish nation, 103

incitement of a group of people to animosity against another,104

other crimes

committed through forms of expression,105

intellectual property crimes,106

gambling

and wagering crimes,107

defamation,108

coercion, 109

public incitement to an offence,

110 breach of the sanctity of religion,

111 incitement to war,

112 credit card fraud,

113 all

computer related crimes,114

offenses protecting the integrity of ICT-systems,115

offenses protecting privacy,116

identity fraud,117

offenses protecting against illegal

content,118

offenses protecting intellectual property rights,119

unauthorised obtaining

of data,120

unauthorised access to a data processing system,121

damage to data,122

and

computer fraud.123

In substantive criminal law it can be seen that most states have

constructed the elements of cyber related crime as a variation to crimes based on a

physical act. As a result computer related crimes definitions are still rather close to

crimes of a physical nature: computer theft has a lot in common with theft; demolition

of computer data is similar to demolition of property and hacking looks like

trespassing.

The Italian National Rapporteurs refer to the fact that as a consequence of the

implementation of Article 3 of the Convention on Transnational Organized Crime a

definition of a transnational offence has now found its way into the Italian legal

system: “Therefore an offence is considered transnational if punished at least with

four years of imprisonment and (a) it is committed in more than one State or (b) it is

committed in one State, but a substantial part of its preparation, planning, direction or

94

Argentina 3, Turkey 8, Poland 4, Italy 4. 95

Argentina 3. 96

Argentina 3. 97

Argentina 3. 98

Argentina 3. 99

Argentina 3. 100

Argentina 3, Italy 4, Brazil 5. 101

Argentina 3. 102

Turkey 4, Italy 4. 103

Turkey 4. 104

Turkey 4. 105

Turkey 4. 106

Turkey 8. 107

Turkey 9. 108

Finland 5. 109

Finland 5. 110

Finland 5. 111

Finland 5. 112

Finland 5. 113

Poland 4. 114

Denmark 3, Spain 3. 115

Germany 7. 116

Germany 7. 117

Germany 7. 118

Germany 7. 119

Germany 7. 120

Switzerland 6. 121

Switzerland 6. 122

Switzerland 6. 123

Switzerland 6.

Page 14: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

14

control takes place in another State; or (c) it is committed in one State, but involves

an organized criminal group that engages in criminal activities in more than one State;

or (d) it is committed in one State, but has substantial effects in another State.”124

It is

regarded very likely that this definition applies to cybercrime offences. The German

report states “As a rule, the jurisdictional reach of the offenses under German law

unfolds only if the definitions of crimes are read together with the general rules on

jurisdiction.”125

The rule stated in this way can be taken as the rule applicable in all

states. In the end, the jurisdiction over an offence is determined by the general part

together with the relevant offence in the special part.

General part related issues

Also the rules of the general part other than jurisdiction have not been amended as a

consequence of the introduction of cybercrimes.126

It may be assumed that this is also

the rule for the states that did not specifically report on it. This means that there are

states for which participants have their own locus and states where participants follow

the locus of the principal perpetrator. In Turkey it appears that participants have their

own locus.127

In other words, if the perpetrator committed the crime in Turkey and the

accomplice assisted from abroad, the latter is not within the Turkish jurisdiction.

Finland uses a different system: an offence by an inciter and abettor is deemed to have

been committed both where the act of complicity was committed and where the

offence is deemed to have been committed.128

In Italy, a crime is considered as having

been committed in Italy also when only a part of the conduct of one of the participants

occurred in Italy.129

Under Swiss law preparatory acts in Switzerland are insufficient to claim a locus in

that country, at least an attempt must be committed.130

The ubiquity theory also

applies to attempts under Swiss law.131

Concerning participation, the conduct of one

co-perpetrator in Switzerland establishes a place of commission in Switzerland for all

co-perpetrators.132

Instigators, aiders and abettors of result crimes have a locus in

Switzerland. The same conduct in Switzerland with a result abroad is outside its

jurisdiction.133

These rules on participation are also applied, as attempts to regulate

criminal liability for providers have failed.134

As a result, a content-provider may

easily be regarded as perpetrator, whereas access and host providers may qualify as

aider or abettor, provided that they have some knowledge of what is happening.135

124

Italy 5 and 6. 125

Germany 7. 126

Brazil 5, Denmark 3. 127

Turkey 9. 128

Finland 2. 129

Italy 6. 130

Switzerland 10. 131

Switzerland 13. 132

Switzerland 14. 133

Switzerland 14 and 15. 134

Switzerland 26-28. 135

Switzerland 30.

Page 15: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

15

For Germany it is relevant that German criminal law also applies to the representative

of a provider, who has its seat in Germany and uploads illegal data.136

Whilst German

law does create responsibilities for legal entities in its Telemedia Act, they cannot be

equalized to criminal liability.137

The legislation differentiates between “content-

provider”, who are responsible for the contents of what they offer and “access-

provider”, who are in general not responsible. The German legislation forms the

implementation of EU Directive 2000/31 on electronic commerce. The broad

application of the rules to representatives may compensate the absence of criminal

liability for legal entities under German law.

Criminal liability for legal entities

On this issue the great divide between states that accept criminal responsibility for

legal entities and states that do not accept this must be noted. Some states

categorically rule out criminal liability for legal entities: Argentina, Turkey, Germany

and Japan.138

Poland seems to be in a middle category as it does provide for

responsibility for legal entities but regards this as quasi-criminal.139

Other states

accept corporate criminal liability: Sweden (on condition that the company is active in

the country), United States (when committed against a protected computer), Finland

(when provided for the specific offence), Italy and Spain (when provided for the

specific offence, several cyber crime offences are listed),140

Brazil (for environmental

crimes only),141

China (for acts endangering society),142

Belgium, the Netherlands,

Switzerland and Denmark accept corporate liability with regard to all offences.143

In Switzerland, “corporate liability plays an important role if one could attribute

responsibility to a host provider through the rules on participation. If a host provider is

not a natural but a legal person, it is still only criminally liable in cases where Article

102(1) Swiss Criminal Code is applicable. This first requires that the responsibility for

the criminal act cannot be attributed to a natural person, e.g. an employee, due to

organizational deficiencies. Second, the provision requires that the offence is

committed “in the exercise of commercial activities in accordance with the objects of

the undertaking”. This requirement ensures that there is a link between the underlying

offence for which the corporation shall be held liable and the activity of the

corporation. Only if these requirements are met can a host provider that is a legal

person be held criminally liable under Swiss law.”144

As a consequence, rules of

attribution of responsibility to providers may have jurisdictional implications and

create a locus in Switzerland. More in general, it seems that in those states that apply 136

Germany 4, referring to Article 14 Penal Code (acting for someone else). 137

Germany 7 and 8. 138

Although provider responsibility is being debated in Japan, see Japan 4. 139

Poland 5. 140

Italy 7, Spain 3. 141

Brazil 6. 142

China 5. 143

However, the Netherlands also provides for an exoneration of intermediaries in the general part of

the Penal Code. Art. 54a is translated as follows: An intermediary, who provides the transmission or

storage of data coming from someone else as a telecommunication service, will not be prosecuted as

such if he obeys a warrant from a prosecutor, issued after authorization from an investigating judge

upon request of the prosecutor, to take all measures that reasonably can be required from him to render

those data inaccessible. Denmark 4, Belgium 4, Switzerland 35. 144

Switzerland 35.

Page 16: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

16

corporate criminal liability the factors that attribute conduct of individuals to the legal

entity are exactly the same that establish the relevant connecting link justifying

jurisdiction over the conduct of the corporation.

The diverging regimes on criminal liability for legal entities may cause problems for

international companies with branches in more than one state. Whereas the same

behaviour in one state by one branch may not be subject to corporate criminal

liability, this may be so for another branch in another state. However, one could

question whether this is a situation in which the position of legal entities is much

different from that of individual persons. In the context of the difficulties that we will

later see with regard to investigations and enforcement, it is to be recommended to

create criminal liability for legal entities operating in a transnational setting.145

Legality issues and double criminality

With regard to the question of whether a state could regulate jurisdictional matters on

its own, answers differ tremendously. Some states refer to the threats of cyber crime

and the need to act upon it, and subsequently accept that a state may unilaterally

determine its jurisdictional rules.146

Some suggest that this may be done on the basis

of a treaty.147

Zagaris, reporting on the United States characterizes the views of his

government under the following title: “The U.S. Government Believes It Can

Regulate Cyber Crime on Its Own.”148

The United States believes that in certain

circumstances a crime may be committed within the territory of a state and hence

justifiable by its criminal courts, even though the actor is physically outside the

territory. The Finnish answer to this question is entirely different: This is a matter that

a state cannot regulate on its own. Because cybercrimes do not respect the borders of

countries, harmonization of legislation plays an essential role in the fight against

cybercrimes.149

In the French report it is stated right from the start: “La

cyberdélinquance et la cybercriminalité soulèvent sur le plan juridique des questions

d'autant plus difficiles à résoudre qu'elles affectent une société globalisée. Cette

situation rend a priori la régulation illusoire à un niveau exclusivement national,

territorial. Elle impose donc de mettre en place un cybercontrôle à l'échelle régionale,

voire mondiale.”150

It is clear that the conclusion in the French Report is that a state

cannot effectively regulate and combat such a fluid form of criminality as cyber

crime.151

The Danish Report tries to find the balance between unilateral and multilateral

measures: “Cybercrime offences are transnational by nature. They might be regulated

nationally by isolated domestic legislative initiatives but only with the risk of

145

See to this extent Draft Resolution 11: “States may consider establishing corporate criminal

liability for legal entities with regard to cybercrime.” 146

Spain 3, Japan 4. 147

Sweden 2, Turkey 8, Italy 6, Switzerland 24, 25 and 50. Russia proposed a Convention on

International Information Security on 21 September 2011, containing provisions that would limit

jurisdiction both substantive and procedural to the territory of the state party. 148

United States 7. This is a view shared by Polish law, in particular because it relates to sovereignty,

Poland 4. 149

Finland 9. Also the Chinese report calls for reluctance, China 5. 150

France 3. 151

France 4.

Page 17: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

17

unnecessary duplicating legislative work, missing important international links and

complicating mutual legal assistance procedures. ICT makes it particularly important

to enhance international corporation in criminal matters. The nature of the internet

makes it possible for perpetrators to find free havens under the jurisdiction of

countries which do not penalize cybercrime offences systematically, do not maintain

up to date jurisdiction rules, or does not have sufficient extradition agreements or

traditions. Cybercrime and the volatility of electronic data create a need for swift and

sometimes secret procedures. Enhanced mutual assistance rules which often depend

on a double criminality requirement also cause a need for equivalent and harmonised

substantive provisions.”152

A middle position is taken by Germany, that acknowledges

the competence for states to determine their own jurisdiction. However, cybercrime

offences are not of such a severe degree, comparable to genocide and crimes against

humanity, that they would qualify under international law. A treaty would be an

option.153

The Italian Report points at an important issue that complicates unilateral application

of jurisdiction: “In relation to minor cybercrimes there may be some obstacles to such

a system, double criminality being the most striking one. What if a criminal conduct

in one State constitutes the exercise of a legitimate right in another State? The balance

between conflicting interests can be done only at national level and cannot be imposed

over a foreign State and its authorities.”154

This observation in essence relates to the

application of the principle of legality. Also the Swiss report expresses a concern

relating to the freedom of speech and political rights.155

Conclusion

Surprisingly, the picture that emerges is that states do not face difficulties in

extending and applying their jurisdictional principles on modern phenomena of

criminal activity. The problem/ frustration seems to lie in the impossibility to bring

perpetrators to justice. As stated in the Swiss report: “In addition to harmonized rules

on the level of substantive criminal law, which are then implemented by domestic

law, it is necessary to have adequate tools for international cooperation in the

prevention, detection, investigation and prosecution of cybercrimes.”156

There are various issues at stake here. The first is whether states have the competence

to determine their own jurisdiction over offences. The prevailing views are that this is

the case. There is no rule under international law that prohibits this. As most states

currently apply the territoriality principle to locate cyber offences within their borders,

the potential for disputes is theoretically rather limited. With the application of

principles other than territoriality most states apply a double criminality requirement.

Most jurisdictional principles, apart from the universality principle, do require that the

conduct must also be criminalized according to the law of the place where it was

committed. The justification for it lies in the requirements of legality.157

For Turkey

152

Denmark 3. 153

Germany 6. 154

Italy 15. The same question is explicitly raised in other reports, see Denmark 2, Belgium 2, Japan 3. 155

Switzerland 50. 156

Switzerland 25. 157

It should therefore not be abolished, Spain 3.

Page 18: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

18

only if no locus can be established in the country, the determination of the locus is

relevant in view of the double criminality requirement.158

The consequence is again

that the offence must be located and we saw already that this may be difficult. When

states apply other jurisdictional principles than territory and require double

criminality, the interests protected by the legality principle are not in danger. It may

be expected from the perpetrator to know the law of the locus.159

It is interesting to see that in the context of cyber crime, it is the territoriality principle

that gives rise to concern.160

Depending on the type of the offence, the question must

be raised whether the perpetrator was able to know the forbidden norm. In other

words, we must analyze what the legality principle requires in this setting. When

applying the territoriality principle, states may argue that those who commit an

offence on their territory must know the applicable legislation. However, with the

wide interpretation of the territoriality principle perpetrators may commit crimes

elsewhere without being present on the territory. This must lead to the additional

requirement that a perpetrator must be able to know that his conduct may cause

effects elsewhere. States are inclined to accept that there is jurisdiction when the

perpetrator wishes to reach that state. It is unclear whether there is jurisdiction over

perpetrators who gave access to content that can be accessed from other states as well.

We must therefore deal with this issue now.

The situation that is of concern to us relates to a perpetrator performing conduct

abroad, causing effects in the state claiming jurisdiction. It is relevant to make a

distinction here, depending on whether the perpetrator aims at creating effects in the

territorial state. At first sight, it seems to be logical to regard it foreseeable for the

perpetrator that a certain prohibitive norm is applicable, if it is his aim or intention to

damage the computer of a specific individual, to attack a specific banking system and

so on. A similar approach can be taken by content related offences send to a specific

individual. With insults and hate speech sent to a specific individual there is an

expectation that it causes effects there. The question must be raised whether what has

been stated thus far with regard to individual victims would also apply in situations in

which the perpetrator may be unaware of their identity or domicile. Territorial

jurisdiction could be justified on the basis of the perpetrator being indifferent as to

whom and where the effects would occur.

Then the situation in which the perpetrator does not send anything, but provides

content that falls within the criminal legislation of a state from which individuals may

have access. This could relate to the language or opinion used, which might violate

provisions on insult, hate speech, political freedoms. It could also relate to national

rules on morals and religion. The content may be regarded as porn or otherwise

violate sexual morals. The content may amount to blasphemy. In these cases the claim

for territorial jurisdiction on the basis of effects in the state does not seem to be

justified as the actor complies with the penal law of the state where he produces or

holds the content. Allowing the state who criminalizes this content to apply its penal

158

See Turkey 3. 159

A critical remark to this could be that even for the perpetrator it may be difficult to know where he

acts! 160

Despite this it should remain the primary principle. See Draft Resolution 3: “The principle of

territoriality remains the primary principle of jurisdiction also in cyberspace.”

Page 19: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

19

laws would lead to the lowest denominator making the rules and seriously infringe

upon the political freedoms and human rights of individuals.161

Should this be different if the website is accessible only in the language of the

territorial state? I do not think so. As long as it is a free choice of those in the

territorial state to browse to the website and as long as they will not be confronted

with the content unsolicited, the interests of the territorial state are not really

harmed.162

To hold the opposite would mean that a state could impose its legislation

on the globe.163

The distinctive criterion of effects produced in a state should therefore

be added with the question whether they were unsolicited or not. Individuals that pull

(download) content in the territorial state may be subject to its legislation as they

possess the illegal content there.164

3. Investigations in Cyber Space

In this paragraph we will analyze to what extent states can investigate in the cyber

world without the necessity of applying mutual assistance from another state. In other

words what can they do on their own? Where do they draw the line and on which

basis? It will be looked at all investigative measures, regardless of whether it relates to

intelligence, obtaining a position of information, or evidence to be used in criminal

proceedings. Like with matters of jurisdiction, also with regard to investigation in

cyberspace the localization of information or evidence play a crucial role. A first

observation is that whereas it is commonly accepted that states may apply their

criminal law over conduct in other states, international law does not allow a state

having jurisdiction to collect evidence in another state on its own. This does not seem

to be logical.

Preliminary: expertise and the limits of technology

Where technology plays a decisive role, the technical possibilities may determine the

legal developments and possibilities. This phenomenon may lead to highly interesting

theoretical questions about where the primacy for the development of the law should

be. Does Microsoft determine how, whether and when investigation are conducted?

Some states and international organizations possess satellites or other devices that

enable them to have a clear and detailed picture of every place in the world. Should

the law regulate the use for purposes of criminal investigation and prosecution? If so,

161

Draft Resolution 5 reads: “With the exception of those crimes for which universal jurisdiction is

accepted under international law, a state may not apply universal jurisdiction de facto or de jure in

cases of prohibited content in cyberspace.” 162

Draft Resolution 8 reflects that a particular nexus must be required: “In determining effects, states

shall consider the existence of a particular nexus with the offence, such as the intent of the perpetrator.” 163

This is expressed in Draft Resolution 9: “When a state localizes the effects of an offence within its

borders, the principle of legality requires that the perpetrator could have had a reasonable expectation

that his or her conduct would cause effects in that country.” 164

See Draft Resolution 10: “A state may exercise its jurisdiction over an individual on its territory

who “pulls” content that is prohibited under its own legal system, even though it is legal under the legal

system of the producer.”

Page 20: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

20

on which level should this be regulated, national or international and what are the

issues at stake?165

Apart from the hard ware and soft ware that make up the virtual world, those who

investigate must have the knowledge to do so. It is reported that there is a strong need

for expertise in investigating cyber crime.166

The Netherlands have taken quite a

number of initiatives to build up expertise amongst its law enforcement agencies and

the judiciary on cyber crime and information society.167

France has specialized and

centralized its contact points concerning the exchange of information related to

cybercrime.168

Whilst Turkish law does provide for the interception of telecommunication, it has

limited this possibility to certain crimes. Cyber crime is not listed as such.169

For

Turkish law it is relevant whether a user of telecommunications is found on its

territory. Turkish law does not allow for searches with remote access.170

Interception

of data is only possible if the providers are in Turkey. The Netherlands have a

panoply of provisions to intercept telecommunication and the transfer of data in many

circumstances.171

Many states limit these methods of investigation to more serious

forms of crime,172

as they infringe severely on the right and expectation to privacy. If

the IP address of the computer is abroad, international assistance must be requested. If

the provider is abroad, and also does not have any branch in the country, the

Netherlands cannot apply its competences directly.173

Under German law, authorities

may not access data located outside the country, unless on the basis of a assistance

request.174

An exception is made for publicly available (open source) stored computer

data. The obligation for providers to cooperate with the investigatory measures in the

sense that they must have the technique and intercept in practice has been regulated in

the Telecommunication Surveillance Regulation.175

On the basis of this legislation,

the interception may not continue if it is identified that the destination computer/ cell

phone is abroad, unless the communication to be intercepted can be connected to a

computer or data storage in Germany. German law does not allow for discrete online

searches.176

Localising revisited

Most states apply the rule that the location where information is held determines

whether national legislation is applicable. For those states localizing the information

is very relevant. In the Swiss report it is stated that the police may do on the internet

165

It reminds us of the “telescreens” predicted by George Orwell in his famous novel 1984. 166

Turkey 11. 167

Netherlands 52-53. 168

France 30. 169

Turkey 18. 170

Turkey 18. 171

Netherlands 23, likewise Italy 8, Denmark 4, France 18-22 and Germany 10-12. 172

E.g. Japan 5. 173

Netherlands 29, similarly Denmark 5. 174

Germany 10. 175

Germany 12. 176

Germany 12.

Page 21: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

21

anything that would be equal to a police patrol in the real world.177

Many report that

no legislation exist on the search of websites or computers located outside the

country,178

however applying a principle of free evidence it is possible to make use of

publicly accessible sources.179

This is a rule that apparently many states apply and

derives from Article 32 of the Convention on Cybercrime.

In the context of the information society and obtaining information and evidence for

purposes of criminal investigation various situations deserve attention, presumed it is

still possible to locate information and evidence: 1. Open information and evidence.

This is information which is publicly accessible simply by surfing through the net.

2. Protected information. Information which cannot be publicly accessed, but which

may be accessed by hacking. 3. Information and evidence that require to take over a

computer or network located in another country. With regard to the first category,

publicly accessible information, the location of the content is irrelevant as long as it is

publicly accessible without further ado. For the Netherlands, it seems that Article 32

of the Convention on Cybercrime sets the boundaries. This is interpreted as that

publicly accessible information may be searched, regardless of the location where the

data is stored. In addition, consent of the person or organization entitle to disclose

may be obtained.180

There is case law accepting the use of pictures derived from

google earth. It is reported that the Minister for Security and Justice is drafting

legislation that would enable the police to search systems without consent of the

owner. It is reported that in cases of decrypted data transfer a decryption-order ought

to be possible. The Netherlands are considering to create a legal obligation to that

extent. The National Rapporteur for the Netherlands supports such searches.181

This is

already the practice in France, where electronic infiltration is possible.182

The Turkish

report proposes three different standards depending on the character of the

information: open information, protected information and remote take-over of a

computer. The first does not require permission, whereas the other two do.183

The

spatial distance between the perpetrator and the victim is an element inherent to cyber

crime.184

Belgium has special legislation “in the specific context of information systems,

reference must be made to article 88ter CCP, authorizing – under certain conditions –

the extension of a search ordered by the investigating judge in an information system

(or a part thereof) to an information system (or a part thereof) located in a different

place than where the search physically takes place, to the extent that the persons

mandated to use the original information system to which the search pertains, have

access to the information system (or part thereof) located in the different place. Unlike

when the data accessed in this way appear to be located on Belgian territory (in which

case the data concerned can not only be seized, copied, blocked, made inaccessible

and even removed on the basis of article 39bis CCP), data located abroad may only be

copied, in which case the competent authorities of the foreign country (provided that

the latter can be reasonably identified) will be informed thereof through the Belgian 177

Switzerland 42. 178

Sweden 3, Poland 7. 179

Brazil 9, Spain 10. 180

Netherlands 34. 181

Netherlands 36. 182

France 22 and 23. 183

Turkey 21 and 22. 184

Turkey 11.

Page 22: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

22

ministry of justice. Finally, accession of publicly available information is considered

unproblematic.”185

Article 706-102-1 of the French code of Criminal Procedure

allows to investigate into data, regardless of where the data is held, without

permission of the owner or provider.186

The picture that emerges is that it is not decisive where the data is actually located as

long as it concerns publicly accessible information in use for investigation. Some

states draw the line with the need to make use of coercive measures and others make

the distinction on whether the information obtained or accessed will be used as

evidence. Investigations that do not require coercive measures may be performed

without mutual legal assistance.187

With regard to the collection of evidence, the

determination of the place where the evidence is stored is relevant for some states,188

but not for other.189

In some states is necessary to know where the evidence is stored

to be admissible.190

In both cases, it means that the information must be localized and this is where it gets

difficult. Again, also in the context of the location where data actually is, problems

arise as much data is in the clouds and may be moved from one server to another,

depending on the availability of space in interconnected servers. Files may be stored

in copies and parts at different servers. The system itself will then, depending on the

amount of data, determine where storage is most efficient and move data to such a

server.191

Even cloud providers may not at all time know, where (their) data is. It is

apparent that this highly complicates the investigation into and the seizure of the

material. Approached in a classical manner, it could mean that by the time law

enforcement agencies have obtained the permission to search a server, the data in

question may have been automatically moved to another unknown location.

In the German National Report the determination of the location of data is described

as crucial, but also very difficult: “A major practical problem concerns the fact that it

is often difficult to determine where a specific information is located. For instance, a

seizure or a data query concerning information located on a server outside Germany

would be illegal since this would violate the sovereignty of the state where the server

is located.”192

An example of that relates to the interception of wireless

telecommunication. If two persons converse by making use of cell phones, it may

involve six states.193

Should all these states have a say in whether conversations may

be intercepted? If so many states have sovereignty over such an investigation, it must

be stated that the individual claim of a state to sovereignty is rather weak.

The generally applicable rules on the search and seizure of recordings laid down in

the Swiss Criminal Code are applicable to e-mail communications. This means that a

search and seizure on a server located outside the country, must be performed by the

185

Belgium 6 and 7. 186

France 21 and 22. 187

Sweden 2, Denmark 6. 188

Netherlands 9, Italy 3. 189

Denmark 2. 190

Argentina 2. 191

Koops and others, p. 7. 192

Germany 4. 193

Gert Vermeulen, Wederzijdse rechtshulp in strafzaken in de Europese Unie, dissertation Gent 1999,

p. 224-293.

Page 23: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

23

local authorities.194

Swiss law provides the surveillance of internet telephone

conversations.195

However, the legality of the various possibilities is uncertain.196

For

law enforcement agents it is almost impossible to meet the demands. On the one hand,

they may not use their own coercive means when the data is located out of the

country. On the other, it is often impossible to locate data. This brought Geist to raise

the million dollar question of Is there a there there?197

Other challenges listed by the Belgian National Rapporteurs: ˝Additional issues,

brought about by technological advancement, concern mostly the possibility for

(potential) offenders to remain undetected. Pre-paid SIM cards, which require no

registration, allow for perpetrators to make phone calls which are untraceable, a

phenomenon that completely undermines any regulation concerning interception of

telecommunications. Equally untraceable is internet use through hot spots using

alternating IP addresses, e.g. in airports. VoIP, also known as voice over IP, allows

telephone calls using the internet. When using VoIP from a hot spot, these

conversation may well remain impossible to trace. Furthermore, detection on the

internet can easily be dodged, especially by using the Tor Browser, but also by simply

installing an IP-shielder. Even using the “incognito-mode” readily provided by

Google Chrome is rendering law enforcement more difficult. Other challenges,

because largely unregulated, are cross-border observation through camera use, spy

drones and environmental taps (from a distance, e.g. through laser measuring of

window vibration and deducting voice from that).˝198

States have developed practices to compensate the problems that might result from the

difficulty to locate where data is stored. The National Rapporteur for the United States

expressed it this way: “The United States, like other countries, takes the position that

it can use its own legal mechanisms to request data from any cloud server, located

anywhere around the world, so long as the cloud service provider is subject to US

jurisdiction — that is, when the entity is based in the United States, has a subsidiary

or office in the United States, or otherwise conducts continuous and systematic

business in the United States.”199

Other states also impose obligations on providers. In practice it is reported that seizure

will be performed at the provider, in order to prevent that information will not be

traceable (cloud computing).200

Italian law allows for the interception of cell phone

194

Switzerland 39. 195

Switzerland 41: “The Swiss Government submitted a draft law to the Parliament in February 2013,

which aims at introducing a legal basis specifically regulating the use of spyware for law enforcement

purposes. According to this draft, the use of GovWare shall, subject to certain criteria, be permitted to

intercept the content of a conversation and traffic data for the investigation and prosecution of certain

particularly grave offences listed in the law, but not for purely preventive purposes. At the same time,

online searches and the surveillance of rooms with microphones or cameras is prohibited by the draft

law.” 196

Switzerland 40 and 41. 197

Michael A. Geist, Is there a there there? Toward Greater Certainty for Internet Jurisdiction, Berkely

Technology Law Journal 2001. 198

Belgium 10. 199

United States 10 and 25. 200

Argentina 2. See also Draft Resolution 14: “States should consider establishing, under national law,

an obligation on service providers to cooperate with law enforcement agencies, by making data

transfer in the cyberworld traceable, giving access to passwords, decrypting content or installing search

devices for investigative purposes. This obligation is subject to the principle of proportionality.”

Page 24: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

24

conversations if the provider is Italian, if the owner (caller/ recipient) of the one of the

cell phones involved is an Italian, regardless of where the provider or satellite is

located.201

In such a case there is no need for international legal assistance. It must be

possible to submit a provider to the factual jurisdiction of the state in order to

intercept telecommunication.202

The National Rapporteurs for Spain state that the

Spanish legislation is completely insufficient as it, due to a constitutional

understanding of the right to privacy of communications, only provides for

interception of telephone, but not for other modalities of telecommunication.203

Self service

States continue to have rather strict rules prohibiting the physical presence of foreign

law enforcement agents on their territory.204

Do these rules apply in the context of the

cyber world that create a virtual reality? Do these rules also apply when law

enforcement agents do not physically enter the territory of another state, but search in

networks or computers located in another state.205

Do the same rules apply and if so,

how do they apply? If the rules prohibiting physical presence do not apply, why is that

so?

In this context it is relevant to refer to a unique provision in the Swiss Penal Code:

foreign officials carrying out investigations in Switzerland, must be authorized by

Swiss authorities. Otherwise, such investigations may amount to criminal conduct,

notably violating Article 271 Swiss Criminal Code criminalizing unlawful activities

on behalf of a foreign State. The criminalization under Swiss law may be unique in

the world. That is not the case for the prohibitive rule that it indicates under

international law. It is undisputed that states may not operate extraterritorially, unless

the local authorities permit that. A definitional problem may arise here, as it can be

debated whether a police officer sitting in his office in his home state is downloading

data from a computer or server located abroad is operating extraterritorially.206

Extraterritorial investigations require permission of the state on whose territory this

will be performed. Self service is not permitted.207

Finland reports that extraterritorial

investigations are regulated in the Coercive Measures Act.208

However, in Denmark it

is reported that the Danish Supreme Court has stated that search of a Facebook and

Messenger account is legal even though the information is stored on a server in a

foreign country. The actual search was conducted on the basis of investigations by

Danish authorities and legally obtained information (passwords obtained via

interception of telecommunication) that was related to a crime subject to Danish

201

Italy 9. 202

Argentina 5, Turkey 12. 203

Spain 4. 204

Police officers may only enter another country and perform their duties if this finds a basis in a

codified international agreement or on the basis of ad hoc permission. The use of coercive measures is

generally ruled out. With minor exceptions, such as the apprehension of a fugitive in the case of a cross

border hot pursuit. See, e.g. Article 41 of the Convention Implementing the Schengen Agreement. 205

The Japanese Report states that the collection of public information does not infringe upon the

sovereignty of another state, see Japan 8. 206

Switzerland 46 and 47. 207

Turkey 21, Italy 11, Brazil 8, Germany 13. 208

Finland 7.

Page 25: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

25

jurisdiction, and the search was conducted without the involvement of foreign

authorities.209

Many states report the possibility of setting up joint investigation teams.210

It is also

referred to Articles 40 and 41 of the Convention Implementing the Schengen

Agreement that allow for cross border pursuit and infiltration.211

All these examples

relate to physical presence of authorities on the territory of another state. Germany

refers to Article 89 of the Treaty on the Functioning of the European Union, which

reads: “The Council, acting in accordance with a special legislative procedure, shall

lay down the conditions and limitations under which the competent authorities of the

Member States referred to in Articles 82 and 87 may operate in the territory of another

Member State in liaison and in agreement with the authorities of that State. The

Council shall act unanimously after consulting the European Parliament.”212

Whilst

the Treaty of the Functioning of the European Union does give a mandate to legislate

on this issue, thus far no initiative has been taken. Article 32 Convention on

Cybercrime is considered to give such a permission under international law. The

Belgian report further proposes to allow for self service if the requested state cannot,

for capacity reasons, comply with the request for assistance.213

The Netherlands have generally applicable legislation on extraterritorial

investigations. Article 539a of the Code of Criminal Procedure gives law enforcement

authorities of the Netherlands the same powers and competence abroad as within the

country, provided that this is not contrary to international law.214

Chapter 13 of the

Guidelines for Criminal Investigation on the basis of the Japanese Code of Criminal

Procedure also declares the Code applicable outside Japan, provided that the other

state accepts it. A logical consequence is, as reported in the National Report from the

Netherlands that there is case law in which the court did not accept that police officer

logged into an email account without a positive answer to a request for international

assistance to the United States in case of Microsoft Hotmail.215

This is seen differently in the United States. The National Rapporteur states that the

US has at least nine different methods of coercion to obtain evidence located abroad,

to obtain testimony from witnesses located abroad, and to secure the transfer of

private assets to the US.216

The methods used by US authorities are often challenged

by the person whose information is sought, as well as by foreign courts. The United

States has a practice of providing itself with the assistance it needs. There is no

legislation that governs the issue.

Analysis

The foregoing demonstrates that states try to make use of the investigative powers

they may have under their own legal system for investigations on their territory. Like 209

Denmark 5. 210

Poland 7, Italy 11, Spain 10, France 16. 211

France 16. 212

Germany 13. 213

Belgium 9. 214

Netherlands 33. 215

Netherlands 35. 216

United States 25 and 26.

Page 26: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

26

with the substantive criminal law jurisdiction we see that states are inclined to locate

things within their territory. This is reflected in attitudes in which states do not ask for

mutual assistance if it is uncertain where the data is held and in situations that they

demonstrate that they are not really interested in knowing where information is. States

have also expanded their investigations to the publicly accessible web and it seems

that the line is drawn where coercive methods of investigation are used or evidence is

needed. What to think of this development?

A first observation is that this is not paralleled with a similar development with the

physical presence of law enforcement officers in another country. This is logical to

the extent that the infringement upon sovereignty is certainly less. One may even

question whether there is an infringement of sovereignty of another state if law

enforcement agencies search at the publicly available worldwideweb. Why would the

sovereignty of a state that is unable to apply its legislation to a certain situation be

infringed only because another state wishes to do something? What is state

sovereignty in the context of cyberworld?217

The rules that are stipulated in this regard are rationalizations of sovereignty,

following the patterns of physical presence. However, the question must be raised

whether this makes sense. Which state is involved when the web is browsed? This

may change from moment to moment. States may not even know that and when they

had sovereignty over something. If states are so concerned about their sovereignty,

they should do much more to protect it. Sovereignty relates to the competence to

determine the rules applicable on your territory with the clear goal of protecting the

interests of your residents and the state itself. Residents have a claim and are entitled

to expectations from the state where they live.218

It is a kind of social contract that

their rights will not be infringed upon, unless provided for by the law of the state

protecting them.

What are the legitimate expectations of a citizen of the www? No state owns the

www, no state guarantees that its legislation is always applicable and may be even

more important: states are unable to give citizens of the internet the protection they

may need. A claim of sovereignty requires the power to enforce it, if necessary by

force. States are too weak do so, the worldwideweb is a shared responsibility of the

community of states.

To regard the cyber world as an area in which states share sovereignty has several

consequences. Citizens can do what they want as long as they do not infringe upon the

rights of others, but the same goes for the law enforcement agencies.219

To formulate

this in concrete terminology, law enforcement agents are entitled to search the internet

if they are entitled to do so under national law if all aspects would be within the

borders. If this includes the production of evidence (a report of what they saw or read/

217

See Draft Resolution 12 on this issue: “The responsibilities of a specific state for violations of

human rights should be decided after a finding of a violation and not as a condition for admissibility of

a complaint with supervisory mechanisms.” 218

Draft Resolution 15: “All persons are entitled to the protection of a national legal system, if there is

a legitimate expectation of protection by that system.” 219

Draft Resolution 13: “Law enforcement agencies, in the same way as citizens, have the right to

navigate the free IT networks without permission from providers, and regardless of where the content

looked at is stored.”

Page 27: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

27

a sample of content) without coercive means,220

there does not seem to be an

impediment to use it as evidence,221

as there is no expectation of protection. In this

argumentation, the dividing line is where there is a legitimate expectation of

protection. This could relate to a search of a server, a search of a computer, a remote

take over of a personal computer, an infiltration undercover in a discussion group and

the like.

Who or which state must give the protection then? That can only be the state that has

the power and the obligation to protect. If I make use of my pc, it is my home state

that I expect to protect me against foreign authorities to take over my computer. This

example demonstrates once again that localization is important. I have a legitimate

claim of protection because both my computer and myself are in the country. If this

view is correct, it is to be recommended that with other situations (data in the clouds)

the place where it is held is determined. Citizens that want to be protected have an

interest in localizing. If localizing remains difficult, it is easy to predict that states will

resort to unilateral means (in the absence of international agreements). An

international agreement on investigation collecting of evidence and enforcement is

necessary to bring cyber space under the rule of law. This is a most urgent matter as it

may be expected that further technological advancement will increase possibilities to

investigate with extraterritorial effects. In the future states will de facto be able to do

more on their own.

4. Mutual Assistance in Criminal Matters

In the previous paragraph we looked at the extent to which states can regulate things

on their own and apply the investigative techniques available on the basis of their own

legislation. It was identified that states must do something to bring cyber space under

the rule of law and prevent that mutual assistance will be bypassed by self service. In

this paragraph we will look at the consequences that the technical developments have

for mutual legal assistance in criminal matters.

The first observation to make is that states reportedly did not change their legislation

on mutual assistance in criminal matters. The French report establishes that as such

cybercrime did not change the general characteristics of the French law on

international assistance. This means that the rules applicable before the advent of

information society and cyber crime are not altered. The basics remaining that the

requesting state sends out a request to the requested state, which will examine it and

then execute it or refuse it, when applying grounds for refusal. Grounds for refusal

remain in place.222

States do report that a wide variety of new investigative techniques

are introduced, that allow law enforcement agencies to investigate in the modern

220

Draft Resolution 17: “Regardless of the nationality of the person in question, no state may apply

coercive measures in another state, unless permitted by the territorial state.” 221

Draft Resolution 16: “States may, subject to national law, freely use evidence that they find on

publicly accessible IT networks.” 222

It is interesting to see that the Convention on Cybercrime completely follows the classical principles

of international cooperation in criminal matters: a request send by one state to another to render

assistance. The nature of international assistance has not been changed by the emergence of

cybercrime, see Brazil 6.

Page 28: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

28

world.223

Whilst cybercrime did lead to some specific provisions concerning new

investigatory techniques, these did not change the nature of the legislation.224

Germany may assist other states with the interception of telecommunication on the

basis of its legislation on international assistance in criminal matters.225

It may do so

with and without treaty basis. However, this country did conclude several bilateral

and multilateral conventions that further specify the conditions under which this

assistance may be given. In addition, it is referred to Framework Decisions 2003/577

on orders freezing property and evidence and 2008/978 on the European evidence

warrant.

Despite the fact that Italy has not yet ratified mutual legal assistance conventions that

specifically deal with interception of telecommunications, it does offer assistance in

this area.226

Also Spain reports that, except for the 2000 EU Mutual Assistance

Convention, it has not concluded conventions that specifically deal with it. However,

interception can be offered to other states on the basis of general clauses in mutual

legal assistance treaties.227

General grounds for refusal apply.228

The introduction of

these new techniques did not as such change the rules of international cooperation.229

What emerges from the national reports is that the information society has confronted

states with a new challenge caused by the speed at which life in the virtual world

goes.230

The German Rapporteur’s analysis is that the changes to mutual assistance

brought about by modern technology are multifarious. On the one hand offences

committed by making use of modern technology, they almost have a transnational

dimension by definition. As a consequence of the territorial limitation of the activities

of law enforcement authorities, they are obliged to request assistance from abroad.

The fluidity of data in conjunction with the time consuming nature of assistance

procedures is problematic. On the other hand, the development of modern technology

has contributed to new methods of investigation and created the possibility of

electronic transfer of documents between state authorities.231

The importance of the speed is also recognized in the words of the Swiss reporters: “A

considerable amount of time may elapse between a request for mutual assistance and

the issuance of a final and binding surveillance order in mutual legal assistance

proceedings. This long duration stands in stark contrast to the fast-paced nature and

fluidity of electronic data, which can be moved across borders within seconds and is

often not stored over a longer period. Hence, such data may no longer be available at

the conclusion of mutual assistance proceedings. Hence, electronic data differs from

“traditional” pieces of evidence, which generally persist in time and are not as easy to

223

Draft Resolution 18: “States should implement the necessary investigative techniques that enable

them to provide mutual assistance in respect of cyber offences, on the basis of the proportionality

principle.” 224

France 17, Switzerland 36 and 37. 225

Germany 10 and 11. 226

Italy 9 and 14 and Brazil 7. 227

Spain 5-10. 228

See also Germany 12, France 17, Japan 6. 229

A few exceptions to this will be discussed later. China would welcome an innovation of the rules of

mutual assistance, China 7. 230

Japan 4. 231

Germany 9, Switzerland 37.

Page 29: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

29

move from one location to another.”232

Swiss law therefore provides for a provisional

order to seize traffic data, which is followed by a formal mutual assistance procedure

before the information obtained is transferred to the requesting state.233

Obtaining an information position234

It is the speed with which things go that has forced some states to build up and to

maintain their information position. Without these measures information would have

been lost, or the exchange of information could not fulfill its function in preventing

crimes to occur. In essence this relates to a new dimension to the purposes of criminal

investigations and mutual assistance. Whereas in the past information and evidence

were needed to respond to offences occurred in the past, nowadays the exchange of

information often relates to the prevention of future offences and to preserve evidence

of offences that will be committed later.235

Especially as part of a package of measures related to combating terrorism, states are

eager to obtain a good information position in order to prevent terrorist attacks or

other crimes from taking place. Given the use of air traffic in the past, as a means of

terrorist attacks, states have given priority to have more knowledge on passengers and

on freight. Regarding passengers, so called Passenger Name Records agreements have

been concluded.236

Also in other areas, such as financial transactions and visa matters,

data are exchanged. These agreements are not without criticism, especially with

regard to their potential to infringe upon privacy and data protection rights.237

We must be aware of the fact that we are entering here the sphere of privacy law.

Whereas on the hand, it should be prevented that the focus of our discussions should

be on the elements of the protection of privacy, it is, on the other hand, inevitable that

some elements of privacy law will be discussed. To what extent will the data be

exchanged for criminal investigation and on which legal basis? To what extent does

the person involved have the possibility to prevent/ correct/ delete information? To

what extent can exchanged information be used as evidence?238

The United States has concluded agreements on exchange of PNR data, SWIFT data

and Visa data. The United States has an on-call unit available on a 24/7 basis. This is

232

Switzerland 43. 233

Switzerland 43 and 44. 234

It is referred to the definition given by Hans Nijboer, General Rapporteur to Section III: “The

existence and the use of enormous amounts of operational information is sometimes referred to as the

information position of investigative and prosecutorial authorities.” 235

Draft Resolution 21: “Information obtained through mutual legal assistance for investigative

purposes may, subject to national law, be used for evidence.” 236

The EU concluded agreements with the United States and with Australia on this matter. See Council

Decision 2010/16/CFSP/JHA of 30 November 2009 on the signing, on behalf of the European Union,

of the Agreement between the European Union and the United States of America on the processing and

transfer of Financial Messaging Data from the European Union to the United States for purposes of the

Terrorist Finance Tracking Program, OJ 2010, L 8/11. 237

France 31 and 32. 238

In the EU context, a special legal instrument has been adopted regulating the data protection rules in

international cooperation in criminal matters. See Council Framework Decision 2008/977/JHA of 27

November 2008 on the protection of personal data processed in the framework of police and judicial

cooperation in criminal matters, OJ 2008, L 350/60.

Page 30: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

30

also the case for the Member States of the European Union, except for Denmark.239

France concluded bilateral treaties on exchange of information between police

authorities, with among others, Serbia.240

Switzerland concluded various conventions

in this respect with the United states, Canada and established links with Europol and

Sirene.241

A further recent development is the establishment of supranational databases and the

online consulting of each other’s databases. An example of that relates to the EU, in

which some Member States have established a mechanism to retrieve data on DNA,

licence numbers of vehicles and finger prints directly from another Member State.242

Several EU states report that a practice has developed.243

Also other data, such as visa

data, custom information, judicial records and child exploitation tracking system may

be accessed and used. One of the consequences is, that the state whose data is used, no

longer is requested to give information and does not take a decision in individual

cases to do so. It also means that grounds for refusal are no longer considered and

applied in the initial stage of information exchange.244

The information that a Member

State was able to see may only be used as evidence after permission of the Member

State that inserted it into the system. Is this a good development? Within the EU

further plans have been developed to create direct access to the criminal records of all

Member States.245

The developments identified here are predominantly European and

United States. The EU has also concluded several agreements on exchanging data

concerning financial transactions: as mentioned with the United States, and with

Switzerland and Japan.246

In addition, it has adopted Decision 2008/633 that gives

Europol access to the Visa Information System. It seems that in the United States a

difference is made between information to be admitted into court and intelligence.

The first requires a formal request, the second can be complied with more easily via

direct consultation.247

All reporting states participate in Interpol. Most states participate in Europol. The

Netherlands report that the European Union has taken the initiative to set up the

European Cybercrime Centre EC3, which has its seat at Europol headquarters.248

Japan and 14 other Asia-Pacific countries participate in the Cybercrime Technology

239

Denmark 6. 240

France 30. 241

Switzerland 48 and 49. 242

Council Decision 2009/1023 of 21 September 2009 on the signing, on behalf of the European

Union, and on the provisional application of certain provisions of the Agreement between the European

Union and Iceland and Norway on the application of certain provisions of Council Decision

2008/615/JHA on the stepping up of cross-border cooperation, particularly in combating terrorism and

cross-border crime and Council Decision 2008/616/JHA on the implementation of Decision

2008/615/JHA on the stepping up of cross-border cooperation, particularly in combating terrorism and

cross-border crime, and the Annex thereto, OJ 2009, L 353/1; Council Decision 2008/615/JHA of 23

June 2008 on the stepping up of cross-border cooperation, particularly in combating terrorism and

cross-border crime, OJ 2008, L 210/1. 243

Finland 8, Poland 8, Netherlands 38, Italy 11. 244

However, the relevant legal instruments stipulate that if the information is to be used as evidence, a

regular request for international assistance must follow. 245

Council Framework Decision 2009/315/JHA of 26 February 2009 on the organisation and content of

the exchange of information extracted from the criminal record between Member States, OJ 2009, L

93/23. 246

Germany 15. 247

United States 37. 248

Netherlands 20. See also Belgium 8.

Page 31: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

31

Information Network system, that was established in 2001.249

Almost all states report

that they have a 24/7 availability for requests for exchange of information and

assistance.

Problems do not seem to occur in situations in which mutual legal assistance is

requested. An example is given in the United States’ Report. The US believes that its

interests are sufficiently protected by the existing grounds for refusal. As US law

provides for a series of measures of intercepting telecommunication, it is also possible

to make use of these on request of a foreign authority. However, the US can only

accommodate requests for assistance of the interception of communications of these

were independently authorized as part of a related or parallel investigation in the US

and disclosing the contents of the intercepted communications were otherwise

appropriate.250

This means that there must be a US judicial order.

Double criminality is required for some requests relating to evidence in some states.251

In other states, there is a call that double criminality could be abolished.252

The United

States have developed a practice of no longer requiring dual criminality in the Mutual

Legal Assistance Treaties it concludes.253

The Danish Rapporteurs mention that

computer-related crime is one of the list offences of Article 2 Framework Decision

2002/584 on the European Arrest Warrant, which means that in extradition

proceedings double criminality will no longer be checked.254

This is also relevant for

the other forms of cooperation within the European Union based on the principle of

mutual recognition.

The dangers seem to exist when mutual assistance in criminal matters is not

requested, but simply obtained through self service. This would result in a situation in

which traditional grounds for refusal (double criminality, nature of the crime, double

jeopardy etc) could no longer be applied. Would it be possible or necessary to reduce

the application of grounds for refusal in this area? This is a relevant question as it is

reported that aside from formal international assistance, assistance is also offered

bypassing the official ways.255

The key problem or challenge once again lies with the

localization of the information or evidence needed. Especially the cloud challenges

traditional mutual legal assistance and its key elements, such as a request in advance.

Difficulty in localization of the data requested, also has an impact on international co-

operation, as it makes it difficult to know to whom to address a request for

assistance.256

The role of private parties in this cannot be underestimated as is evidenced by

reference to the Belgian Yahoo case dating from 2007.257

The Belgian authorities

249

Japan 10. 250

United States 22. 251

Argentina 5, Turkey 12. Japanese law maintains double criminality, unless in relation to the United

States, see Japan 6. 252

Spain 10. See further Draft Resolution 20: “In situations where there is a common understanding of

cybercrime offences, the trend towards the elimination of the requirement of double criminality as a

condition for mutual legal assistance should be encouraged.” 253

United States 25. 254

Denmark 5. 255

Switzerland 37. 256

Koops and others, p. 7. 257

Koops, p. 22.

Page 32: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

32

wanted to obtain information from Yahoo and requested the Belgian branch (Yahoo

Customer Care) to assist. They refused and referred to their US headquarters. The

Belgian authorities then requested assistance from the US authorities. This is only one

example of situations in which private parties demonstrate that they do not regard it as

their task to become an assisting police officer. To a certain extent one can understand

this as delivering assistance to the police is time consuming and therefore costs

money. However, in each criminal justice system citizens can be obliged to cooperate

with investigations, even if this may cost time and money. In cyber space, private

parties operate as militias, pirates or otherwise autonomous entities and escaped this

as a result of the weakness of states to claim and defend their sovereignty.

What about obligations to retain data on information transmission? Do providers have

the obligation to organize their network in such a manner that they may comply with

all different and complicated request for assistance from law enforcement agencies of

other states?258

How could this be done with providers not having a seat in the

relevant state? Another example of a problem is when the police wishes to know who

hosts a website. The police can technically look at/in the webserver and may then

identify that the real IP-address is in another country. At that moment, the possibility

exists to obtain evidence and to make the website inaccessible for others.259

Turkish

law regards the state where the provider has its legal seat as the state to which

requests for mutual legal assistance should be send to.260

These difficulties to locate and to enforce support the case for an international

agreement that regulates under which circumstances private parties are obliged to set

up their systems in such a manner that the necessary information can be obtained. One

option could be to oblige them to localize activities in the cyber world (even applying

a legal fiction). This option could also bring relieve to the protective sight of

localization. Different standards in data protection rules are reported as an obstacle to

international assistance.261

In Argentina, Brazil and Spain, the concept of habeas data

exists, which allows the citizen to obtain knowledge and request correction or deletion

of data with regard to him.262

Another option could be that international agreement is reached on the circumstances

under which states may undertake unilateral actions, and apply specifically regulated

investigative techniques. It is interesting to see that more and more forms of

cooperation come up that can also be regarded as specific or special investigatory

methods. What these methods have in common is that it is unclear at the moment of

using them whether the offences will in the end be prosecuted in one state or in

another. In addition, the classical roles of requesting and requested state are also

blurred. The technological progress of information society will lead to a severe

decrease of both a de facto and a de jure need for mutual assistance in criminal

matters.

5. Enforcement in the Clouds

258

Japanese providers are obliged to cooperate with the Japanese police, Japan 5. 259

Koops and others, p. 46. 260

Turkey 3. 261

Turkey 12, France 23, Switzerland. 262

Brazil 9.

Page 33: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

33

The almost unlimited possibilities of information technology do raise questions with

regard to whether states may directly enforce judgments, or provisional measures by

making use of information technology, without asking permission of whatever other

state. It seems that on this issue the wish to intervene and technical possibilities to do

so must be reconciled with the fact that it may infringe upon the sovereignty of

another state.263

In a situation in which there is a legal decision that a certain website must close down,

because it contains child pornography, hate speech or other illegal material, should it

be allowed for law enforcement agencies to hack that site in order to prevent it from

further committing crimes? It is therefore relevant to look at both the possibility of

taking provisional measures as well as enforcing final decisions.

Many states report no legal means to close down a website.264

It is often referred to

the obligations of the provider to delete illegal content. In the Netherlands this means

that the Public Prosecutor may order a provider to do something. A failure to do so is

a criminal offence.265

However, if the provider is outside the Netherlands, this cannot

be enforced.

On the basis of the Turkish Law of Internet a court may order the “precautionary

measure” of banning access to the content of a specific site. It is reported that as a

consequence of the fact that those entitled to challenge the measure before Turkish

courts may find themselves abroad, the measure may obtain a permanent character.266

The minimum necessary link for Turkey to take such a measure is that the content

may be accessed from Turkey. Polish law provides for a notice and take down

procedure in Article 14 of the Electronic Services Act 2002.267

Denmark may

confiscate a domain if it contains illegal materials, 268

Spain on the basis of Act

34/2002 on Information Society Services and Electronic Commerce,269

and Belgium

may do so on the basis of Article 39bis paragraph 3 of the Code of Criminal

Procedure.270

France may apply its “loi n° 2011-267 du 14 mars 2011 d'orientation et

de programmation pour la performance de la sécurité intérieure (LOPPSI II).”271

Italy has the legal means to deny access to Italian users by an order issued to the

service provider.272

The nationality of a website is irrelevant. If the judicial authority

decides to proceed to the seizure of a website, it issues an order to the Italian service

provider, which must disable access in Italy. The United States can make use of a

notice and take down process on the basis of a court order. There is a wide practice

263

Draft Resolution 19: “States should in particular be able to provide fast assistance, and a

provisional order to preserve data should be introduced. Such an obligation to preserve data should be

for a reasonable time only.” 264

Sweden 3, Brazil 9, Germany 15, Japan 10. 265

Netherlands 22. 266

Turkey 3 and 24. 267

Poland 8. 268

Denmark 7. 269

Spain 11. 270

Belgium 8. 271

France 23. However, this act does not allow to undertake remote fishing expeditions in personal

computers, see France 33. 272

Italy 14.

Page 34: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

34

regarding copyright infringements.273

The National Rapporteur is of the opinion that

an international enforcement system to implement decisions, such as internet banning

orders or disqualifications in the area of cybercrime, can only be successful in the

context of a treaty that has a substantial participation from states across the world and

is implemented by an organization that has almost universal membership.274

There is

quite some skepticism regarding the feasibility of such a system.275

However, the

complexity of enforcement in a virtual world requires international agreement.276

It this becomes clear from the few states that report on the enforcement issue that,

once again the localization of where to perform the act of closing or deleting data is a

key issue. States that did take action localize the responsibility with the provider. This

is a tool that may increase the chance of being able to enforce decisions. It would be

preferable when states could reach an agreement on what they can do and not do with

and without the assistance of other states.277

This is not only relevant for investigation

and prosecution, but also for the defence. When the responsibilities are clear, it makes

it easier for the defence to claim its rights. Without clear responsibilities there is a fair

chance that also legal remedies cannot be localized.

6. The Virtual Court Room

In this paragraph we will look at the consequences of the new possibilities for the

preparation of the investigation and conducting the court hearing. Modern

telecommunication creates the possibility of contacting accused, victims and

witnesses directly. Should this be allowed, and if so, under which conditions? If not,

should the classical rules on mutual assistance be applied (request and answer) and

why?

The notification of judgements, decisions, summons and other legal documents may

have legal consequences. Similarly as to old style notifications on paper, the law will

attach these consequences also to notifications send by information technology.278

On

the basis of German law German authorities may contact persons abroad directly,

when it cannot be expected that the other state will regard this as an infringement of

its sovereignty.279

The Netherlands’ Report could imagine that suspects and witnesses

will be reached by email and will be invited to the proceedings in that manner.280

French law is very open to making use of new techniques throughout the criminal

proceedings: “L'utilisation des nouvelles technologies de la communication peut se

révéler utile pour accomplir divers actes de procédure. Elle peut l'être notamment 273

United States 34 and 35. 274

United States 36, Turkey 25, Netherlands 41, Brazil 10, Belgium 4, Spain 11. 275

Poland 9, Italy 15, Denmark 7, Japan 10. 276

Draft Resolution 2: “States should consider acceding to existing international instruments on

cybercrime or developing further international legal mechanisms in order to establish the rule of law in

cyberspace and avoid potential conflicts between states on the enforcement of their legislation and

policies in cyberspace.” 277

Draft Resolution 22: “A (provisional) decision by a criminal court to close down a server, website

or corresponding entity may be enforced directly if provided for by an international agreement or by

the law of the state in which the service provider is located.” 278

It is reported that the Nordic states are discussing this (Sweden 3). In 2010, e.g., the German postal

services introduced the electronic Zustellung, equal to a formal notification by an usher. 279

Germany 17. 280

Netherlands 51.

Page 35: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

35

pour faciliter l'audition de témoins, experts, victimes ou accusés en cours d'enquête ou

d'instruction, voire dans la phase de jugement lors d'une audience. Cette possibilité est

offerte en France en vertu des dispositions du Code de procédure pénale relatives à

l'utilisation de moyens de télécommunications au cours de la procédure (art. 706-

71).”281

As contacts between people are more and more making use of electronic devices, the

question comes up whether the administration of justice should remain at the status of

centuries ago.282

Flight tickets are issued electronically, dentists’ appointments sent

per sms and invitations to whatever kind of meeting send by email. In some states

new acts are no longer printed on paper anymore, but only published in digital format

on the government’s website. It is reported that courts in the Netherlands may have

only digital files of the proceedings in the near future. For both aspects: the

facilitation of the administration of justice and the preliminary investigation I would

support making use of direct contacts with witnesses, victims, experts, accused and

their counsel.

Videolink testimony

Many states report a practice using videoconferences, court hearings using skype,

emailing scanned documents and so on.283

The Italian report states that: ”Information

technology can facilitate mutual legal assistance without changing its nature. (…)

Specificities of information technology make it possible to carry out traditional

activities, such as testimony, without the need for people to move to a foreign State.

(…) However, it is difficult to believe that these new methods could be applied

without the assistance of the authority of the State involved.”284

However, other

National Reports underline the changed nature: “The rise of information technology,

such as e.g. low and medium earth orbiting satellites and foreign servers, has

profoundly impacted upon the nature of mutual legal assistance. It has created a need

for cooperation and mutual legal assistance where no such need existed before by

adding an international dimension to situations which formerly were purely

national.”285

Turkish, Polish, Dutch, Italian, Danish, Spanish and Finnish law provide for

videoconferences with witnesses and experts.286

Poland (mandatory ground for

refusal) and the Netherlands (optional ground for refusal) have explicitly ruled out

video-conference with accused.287

The e-justice site of the European Union lists all

the facilities within the European Union that have the capacity for video conferences.

Whilst states are expanding the possibilities, it cannot be ruled out that the different

speed at which states can provide the technological infrastructure may lead to

281

France 32. 282

Draft Resolution 27: “Communications may be sent by the authorities directly to the accused,

witnesses, victims and experts who are physically present in another state, subject to the acceptance of

said state of this method of communication.” 283

Argentina 8, Brazil 12, Germany 17 and 18. 284

Italy 7 and likewise Belgium 6. 285

Belgium 5. 286

Turkey 28, Finland 9, Poland 10, Netherlands 49, Italy 18, Denmark 8, Spain 12. 287

Poland 10, Netherlands 50.

Page 36: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

36

situations in which the requested state cannot offer the requested assistance, because it

does not have the technique.

Many National Reports do not see a legal impediment to make use of video-

conferences, it depends on the other state.288

Skype is an alternative to telephone

hearings, according to the Belgian report.289

The Italian report suggest that during

investigation, direct contacts with victims and potential witnesses may be allowed.290

This is different, once the trial stage has arrived. Then a formal request for assistance

must be made.291

The reluctance in Germany with regard to interrogating witnesses

finds its basis in the principle of immediacy, stipulating that all evidence should be

presented at the hearing. However, German law does provide for an exception in case

of witnesses abroad unable or unwilling to travel to the court room.292

Hearing of

accused via the screen is in most cases not possible as it violates the accused’s

obligation to be present.293

Only in minor cases, it is possible to refrain from this

obligation. The National Rapporteur for Germany refers to advantages of video-

conferences in terms of facilitation of the proceedings and a better quality of the

evidence and the use of the right of confrontation in comparison to reading out written

testimony, with which this is not possible. However, in comparison to personal

appearance of witnesses, disadvantages remain in existence, as a direct impression of

the witness is not possible.294

The National Report for France points at another limitation related to human rights

standards. Making use of testimony via video-conference must comply with the right

to a fair trial under Article 6 European Convention on Human Rights.295

States are

not completely in agreement on the question whether the physical presence of accused

or witnesses is an absolute necessity. When it comes to human rights obligations, it

must be stated that neither the physical presence of the witness nor the presence of the

accused is an absolute requirement under human rights treaties. With regard to both

exceptions are possible. It is the national criminal justice system that sets the limits

here. The question comes up whether the quest for the best evidence should always

indicate physical presence as being the ideal situation.

The Danish report: “The sovereignty of states, due process principles, and

fundamental procedural rules (e.g. translation into ones native language, self-

incrimination, and the rules related to a non-compellable witness and oath) should be

respected. Direct contact between the accused and a foreign state would make this a

difficult task.”296

It is interesting to see that both sovereignty and fair trial concerns

may lead to reluctance with states. I personally would see a need to safeguard the

rights of the individuals contacted via modern technology. Any person receiving

whatever notification must be informed about the consequence of (not) responding to

it. Persons testifying from abroad must know whether they are subject to an

obligation, perjury rules and testimonial privileges.

288

Sweden 3, Spain 13. 289

Belgium 10. 290

Similarly Belgium 9. 291

Italy 17. 292

Germany 17 and 18. 293

A question could be whether presence can be physical presence only. 294

Germany 17 and 18, Japan 13. 295

France 32 and 33, Italy 17. 296

Denmark 8.

Page 37: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

37

The virtual court room

Do we envisage a virtual court room, in which hearings may take place, whilst

nobody is present in the real court room?297

Whilst the Brazilian report could very

much imagine such a future development, 298

this scenario is opposed very clearly in

the Italian Report.299

The Argentine report suggest that we may see a kind of “digital

litigation” in the near future: “La computación en la nube (cloud computing), será uno

de los temas con los que tendrá que lidiar en los próximos años la introducción e

implementación del expediente digital.”

The very fact that it has become increasingly simple to speak with persons abroad

through audio-visual techniques (skype, videoconference) raises the question whether

this should not lead to a higher threshold for extradition for the purposes of

prosecution. If the accused is not present in the state that prosecutes him extradition is

likely to take place. In light of the serious infringement on the liberty of the accused,

the question may be raised whether it should be preferred to conduct the trial via a

video-link.300

Also the presumption of innocence would oppose burdensome

extradition. Should we reserve extradition for convicted persons?

Security of the communication

It is necessary to verify the identity of the sender of messages via email and the

like.301

The confidentiality of the lines of communication must be secured.302

The

Convention on Cybercrime is criticized for not offering sufficient guarantees of

establishing confidentiality.303

The safety of the information must be secured. This is

one of the reasons to involve the other state.304

The protection of the reliability and

severity of the lines of communication is of the utmost urgence.305

7. Real Human Rights in a Virtual World

Gradually it becomes clear that the difficulty of localizing data, conduct and

infringements does have a severe impact on the protection of human rights. Human

rights supervisory mechanisms give rights to individuals vis-à-vis the state in which

297

Draft Resolution 29: “States should be encouraged to consider the possibility of and conditions for

the collection of evidence through digital technology, even though the individual was not physically

present at the hearing.” 298

Brazil 12. 299

Italy 8. 300

Draft Resolution 28: “On condition of the consent of the individual concerned, the possibilities of

making use of digital technology, such as videolinks, should be expanded in order to lessen the need

for such intrusive measures as extradition.” 301

Netherlands 23. 302

France 32. 303

France 36. 304

Italy 17. 305

Draft Resolution 30: “The security and reliability of the lines of communication in use by the

authorities must be of the highest standard. The communications should be protected against hacking.”

Page 38: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

38

jurisdiction they find themselves.306

It thus requires that it can be identified that the

human rights affected are within the jurisdiction. As with everything related to

cyberspace, this may proof to be very difficult. Earlier on I considered the cyber

world to have the characteristics of an area in which responsibilities are shared. When

obligations are shared, human rights are especially vulnerable as it must be identified

which state must use its protective powers.307

The Swiss report points at the vulnerability of human rights in cyberspace: “Various

human rights of the Swiss Constitution (which often find a counterpart in cantonal

constitutions) are potentially jeopardized in the context of criminal investigations

using information technology. Among them are the right to privacy in persons’ private

and family life, in their home and in relation to their mail and telecommunications, the

right to be protected against the misuse of their personal data, and the freedom of

expression and information.”308

The German Constitutional Court developed a right to

integrity and confidentiality of computer systems, which is also applicable in a

context of cooperation.309

Swiss law obliges law enforcement officials to obey the

Constitution wherever they are.310

In sum, the rights potentially violated are the right

to privacy and freedom of expression and possibly the right to a fair trial. Other rights

that require the physical presence, such as the protection of life, the prohibition of

torture and the right to liberty are less vulnerable in the virtual world.

In their answers to the question concerning human rights no specific aspects are being

reported by the National Rapporteurs. The questionnaire was probably not phrased

well as it aimed at obtaining a picture of the responsibility that states may have for

human rights violations by other states or violations of which it is not possible to find

out the responsible state.311

The Swedish National Rapporteurs suggest that their

country may be held accountable if it were to abuse information transmitted to another

state.312

Turkish authorities may not use material as evidence if it were collected by

foreign authorities under violations of human rights rules.313

Under Japanese law,

evidence collected unlawfully elsewhere may be inadmissible in a criminal

proceeding in Japan. In a case in which accused were questioned in China, the

Japanese prosecution was present at the interrogation in China, in order to evade

concerns of human rights violations.314

The French report describes an interesting case in which US law enforcement

authorities set up an internet site destined to attract pedophiles.315

As a Frenchman

showed interest, the information was passed on to the French authorities, who made

306

Japan 11 and 12. 307

Draft Resolution 23: “States shall respect internationally recognized human rights standards also in

the context of the digital world.” 308

Switzerland 51. 309

Germany 17. 310

Draft Resolution 24: “If states act extraterritorially while investigating in cyberspace, they shall

comply with the human rights standards applicable to their jurisdiction (agent control standard).” 311

Draft Resolutions 25 and 26: “25.States should record investigations in cyberspace with a view to

ensuring state accountability in the event of violations of human rights; 26.The responsibilities of a

specific state for violations of human rights should be decided after a finding of a violation and not as a

condition for admissibility of a complaint with supervisory mechanisms.” 312

Sweden 3, similarly Italy 17, Brazil 11, Belgium 8, Germany 17. 313

Turkey 27. 314

Japan 12 and 13. 315

France 36 and 37.

Page 39: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

39

use of it in the context of a criminal investigation. The Court of Cassation disregarded

the information obtained by the American authorities, as these were an entrapment

violating the right to a fair trial protected under Article 6 ECHR. The National

Rapporteur cites an author criticizing police authorities stating that cyber crime should

be combated with equal means. However, the rule of law obliges state authorities to

respect the right to a fair trial, even vis-à-vis persons that disrespect the law.316

8. Concluding remarks

In sum, it seems that the impact of the information society to international criminal

law is threefold. The first is that the information society creates a transnational threat

for certain legal goods, whilst other may remain unaffected by it. The second is that

the information society creates, on the other hand, a tool for criminal justice. The third

major impact relates to the loss of sovereignty. The information society has seriously

decreased (or maybe even taken away) the value and importance of territoriality. As

localisation is difficult, impossible or constantly moving this is the key issue of

cyberspace. In all respects cyberspace does not stand still long enough to allow states

to claim their sovereignty over whatever happens.

The main challenge is therefore to recognise the shared responsibility of states for the

cyber world. Whether you like it or not, criminal law and the enforcement practice

must learn to live with the loss of location. It may not be overstated to say that it is

time to rethink the application of the law. Osinga described this as follows: “Yet we

use the lexicon of the physical world to describe cyberspace – we “enter”, “navigate”,

“move through’, there are sites, we surf, we store, and sometimes we get lost in it, yet

there is no “there” there: it is a de-territorialised space. And unlike the other domains,

cyberspace has no physical obstacles, nor “real” boundaries like a shore. Moreover,

distance and time make no sense in the traditional meaning, indeed, in cyberspace

distance disappears. Data can appear simultaneously, or almost, at various places.”317

This raises the question whether we should also take into consideration that

localisation may not be possible. This General Report departs from the presumption

that such localisation is possible, either directly, or by making use of a legal fiction,

such as localising data at the provider.

The general feeling reading all the national reports is that both state legislation as well

as conventional treaties lay far behind what is technically possible and that it is time

to take a few steps. In the Brazilian report this is summarised as follows: “en tiempos

en los que la información trafica de manera excesivamente veloz y sin respetar

fronteras, la armonización legislativa entre los países puede generar efectos benéficos

al combate de la criminalidad informática.”318

This is necessary to evade the coming

into being of a state of anarchy.

As no state is able to completely enforce its legislation in the cyber world, human

rights are unprotected in the virtual world. Maybe this can be remedied if also human

rights obligations are localized. Following rules of localization of conduct and data, it

316

France 37, footnote 95, citing Chilstein. 317

Frans Osinga, Introducing Cyber Warfare, in: Paul Ducheine, Frans Osinga, Joseph Soeters (eds.),

Cyber Warfare, Asser Press, The Hague 2012, p. 9. 318

Brazil 5 and 6.

Page 40: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

40

appears that the provider could be taken as linchpin to applying the legislation of a

specific state. It is logical that if a state applies its legislation to something, that it

brings about the application of human rights as well.

The freedom created by cyberspace does have many sides from which the individual

has benefited. However, it emerged that also serious dangers to this freedom exist.319

If states are not able to find a way to shape their responsibility over the internet and to

bring it under the rule of law, cyber space equalizes a state of anarchy. That would

result in a world in which organized crime rules and human rights have no meaning.

319

See Explanatory Report to the Convention on Cybercrime, par. 1-6.

Page 41: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

41

Draft Resolutions Section 4

Preamble

The participants of the Preparatory Colloquium for Section IV held in Helsinki from 9

to 12 June 2013 propose the following resolutions to the XIX International Congress

of Penal Law, to be held in Rio de Janeiro from 31 August to 6 September 2014:

Considering that people’s lives in the 21st century are heavily influenced and shaped

by information and communication technology (ICT) as well as by the opportunities

and risks that accompany information society and cyberspace, and that therefore

crimes in these areas affect important personal and collective interests;

Noting that states share sovereignty in cyberspace and have a common interest in its

regulation and protection;

Recognizing that states have made considerable efforts to vest jurisdiction and

determine the locus delicti of offences that may affect the integrity of ICT systems

and cyberspace as well as the related interests of persons and society;

Keeping in mind the particularities of cyberspace, such as the speed at which data

flows, its volatility, and the fact that it can be accessed anywhere in the world;

Recognizing further the difficulties in localizing information and evidence in

cyberspace;

Stressing the fundamental importance of the protection of human rights, in particular

the principle of legality, the right to privacy, the right to a fair trial, the principle of

proportionality in the investigation and prosecution of offences, and in general all the

rules and principles regarding due legal process;

Referring to international and regional instruments that seek to guide and coordinate

efforts and to harmonize legislation, such as the Budapest Convention on Cybercrime

of 23 November 2001, EC E-Commerce Directive 2000/31/CE, EU Framework

Decision 2005/222/JHA on attacks against information systems, EC Data Retention

Directive 2006/24/CE, the Commonwealth of Independent States Agreement on

Cooperation in Combating Offences related to Computer Information of 2001, the

Arab Convention on Combating Information Technology Offences of 2010, the

Shanghai Cooperation Organization Agreement on Cooperation in the Field of

International Information Security of 2010, and the draft African Union Convention

on the Establishment of a Legal Framework Conducive to Cybersecurity in Africa of

2012;

Building on the debates and resolutions of past International Congresses of Penal

Law, especially the resolutions of Section II of the XV International Congress (1994)

held in Rio de Janeiro, on computer crimes and other crimes against information

technology, and the resolutions of Section IV of the XVIII International Congress

(2009) held in Istanbul, on universal jurisdiction;

recommend the following:

Page 42: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

42

A. General Considerations

1. States should develop a coherent response to the challenge of cybercrime,

in particular by keeping their legislation and practice under review in

order to ensure that their criminal law, criminal procedure and mutual

legal assistance regimes meet the needs of today’s interconnected

globalised world.

2. States should consider acceding to existing international instruments on

cybercrime or developing further international legal mechanisms in order

to establish the rule of law in cyberspace and avoid potential conflicts

between states on the enforcement of their legislation and policies in

cyberspace.

B. Substantive Jurisdiction and Locus Delicti

3. The principle of territoriality remains the primary principle of jurisdiction

also in cyberspace.

4. States should exercise restraint in the establishment of extraterritorial

jurisdiction, with a view to preventing conflicts of jurisdiction rather than

relying primarily on their resolution once they occur.

5. With the exception of those crimes for which universal jurisdiction is

accepted under international law, a state may not apply universal

jurisdiction de facto or de jure in cases of prohibited content in

cyberspace.

6. Offences may have more than one locus. States may establish a locus

delicti within their borders if conduct takes place there or causes effects

there.

7. States should exercise restraint in applying the effect theory in situations

in which the effect is not “pushed” by a perpetrator into the state, but

“pulled” into it by an individual in that state.

8. In determining effects, states shall consider the existence of a particular

nexus with the offence, such as the intent of the perpetrator.

9. When a state localizes the effects of an offence within its borders, the

principle of legality requires that the perpetrator could have had a

reasonable expectation that his or her conduct would cause effects in that

country.

Page 43: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

43

10. A state may exercise its jurisdiction over an individual on its territory

who “pulls” content that is prohibited under its own legal system, even

though it is legal under the legal system of the producer.

11. States may consider establishing corporate criminal liability for legal

entities with regard to cybercrime.

C. Investigations in Cyberspace

12. No state has exclusive sovereignty over the publicly accessible IT

networks.

13. Law enforcement agencies, in the same way as citizens, have the right to

navigate the free IT networks without permission from providers, and

regardless of where the content looked at is stored.

14. States should consider establishing, under national law, an obligation on

service providers to cooperate with law enforcement agencies, by making

data transfer in the cyberworld traceable, giving access to passwords,

decrypting content or installing search devices for investigative purposes.

This obligation is subject to the principle of proportionality.

15. All persons are entitled to the protection of a national legal system, if

there is a legitimate expectation of protection by that system.

16. States may, subject to national law, freely use evidence that they find on

publicly accessible IT networks.

17. Regardless of the nationality of the person in question, no state may

apply coercive measures in another state, unless permitted by the

territorial state.

D. International Cooperation in Criminal Matters and Enforcement

18. States should implement the necessary investigative techniques that

enable them to provide mutual assistance in respect of cyber offences, on

the basis of the proportionality principle.

19. States should in particular be able to provide fast assistance, and a

provisional order to preserve data should be introduced. Such an

obligation to preserve data should be for a reasonable time only.

20. In situations where there is a common understanding of cybercrime

offences, the trend towards the elimination of the requirement of double

Page 44: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

44

criminality as a condition for mutual legal assistance should be

encouraged.

21. Information obtained through mutual legal assistance for investigative

purposes may, subject to national law, be used for evidence.

22. A (provisional) decision by a criminal court to close down a server,

website or corresponding entity may be enforced directly if provided for

by an international agreement or by the law of the state in which the

service provider is located.

E. Real Human Rights in a Virtual World

23. States shall respect internationally recognized human rights standards

also in the context of the digital world.

24. If states act extraterritorially while investigating in cyberspace, they shall

comply with the human rights standards applicable to their jurisdiction

(agent control standard).

25. States should record investigations in cyberspace with a view to ensuring

state accountability in the event of violations of human rights.

26. The responsibilities of a specific state for violations of human rights

should be decided after a finding of a violation and not as a condition for

admissibility of a complaint with supervisory mechanisms.

F. Virtual Court Room

27. Communications may be sent by the authorities directly to the accused,

witnesses, victims and experts who are physically present in another

state, subject to the acceptance of said state of this method of

communication.

28. On condition of the consent of the individual concerned, the possibilities

of making use of digital technology, such as videolinks, should be

expanded in order to lessen the need for such intrusive measures as

extradition.

29. States should be encouraged to consider the possibility of and conditions

for the collection of evidence through digital technology, even though the

individual was not physically present at the hearing.

Page 45: International Association of Penal Law / Association … 19 Congresso AIDP/Sect IV AIDP... · 1 International Association of Penal Law / Association Internationale de Droit Pénal

45

30. The security and reliability of the lines of communication in use by the

authorities must be of the highest standard. The communications should

be protected against hacking